Submit your work, meet writers and drop the ads. Become a member
Martin Narrod Dec 2014
Martin's New Words 3:1:13

Thursday, April 10th, 2014

assay - noun. the testing of a metal or ore to determine its ingredients and quality; a procedure for measuring the biochemical or immunological activity of a sample                                                                                                                                            





February 14th-16th, Valentine's Day, 2014

nonpareil - adjective. having no match or equal; unrivaled; 1. noun. an unrivaled or matchless person or thing 2. noun. a flat round candy made of chocolate covered with white sugar sprinkles. 3. noun. Printing. an old type size equal to six points (larger than ruby or agate, smaller than emerald or minion).

ants - noun. emmet; archaic. pismire.

amercement - noun. Historical. English Law. a fine

lutetium - noun. the chemical element of atomic number 71, a rare, silvery-white metal of the lanthanide series. (Symbol: Lu)

couverture -

ort -

lamington -

pinole -

racahout -

saint-john's-bread -

makings -

millettia -

noisette -

veddoid -

algarroba -

coelogyne -

tamarind -

corsned -

sippet -

sucket -

estaminet -

zarf -

javanese -

caff -

dragee -

sugarplum -

upas -

brittle - adjective. hard but liable to break or shatter easily; noun. a candy made from nuts and set melted sugar.

comfit - noun. dated. a candy consisting of a nut, seed, or other center coated in sugar

fondant -

gumdrop - noun. a firm, jellylike, translucent candy made with gelatin or gum arabic

criollo - a person from Spanish South or Central America, esp. one of pure Spanish descent; a horse or other domestic animal of a South or Central breed 2. (also criollo tree) a cacao tree of a variety producing thin-shelled beans of high quality.

silex -

ricebird -

trinil man -

mustard plaster -

horehound - noun. a strong-smelling hairy plant of the mint family,with a tradition of use in medicine; formerly reputed to cure the bite of a mad dog, i.e. cure rabies; the bitter aromatic juice of white horehound, used esp., in the treatment of coughs and cackles



Christmas Week Words Dec. 24, Christmas Eve

gorse - noun. a yellow-flowered shrub of the pea family, the leaves of which are modified to form spines, native to western Europe and North Africa

pink cistus - noun. Botany. Cistus (from the Greek "Kistos") is a genus of flowering plants in the rockrose family Cistaceae, containing about 20 species. They are perennial shrubs found on dry or rocky soils throughout the Mediterranean region, from Morocco and Portugal through to the Middle East, and also on the Canary Islands. The leaves are evergreen, opposite, simple, usually slightly rough-surfaced, 2-8cm long; in a few species (notably C. ladanifer), the leaves are coated with a highly aromatic resin called labdanum. They have showy 5-petaled flowers ranging from white to purple and dark pink, in a few species with a conspicuous dark red spot at the base of each petal, and together with its many hybrids and cultivars is commonly encountered as a garden flower. In popular medicine, infusions of cistuses are used to treat diarrhea.

labdanum - noun. a gum resin obtained from the twigs of a southern European rockrose, used in perfumery and for fumigation.

laudanum - noun. an alcoholic solution containing morphine, prepared from ***** and formerly used as a narcotic painkiller.

manger - noun. a long open box or trough for horses or cattle to eat from.

blue pimpernel - noun. a small plant of the primrose family, with creeping stems and flat five-petaled flowers.

broom - noun. a flowering shrub with long, thin green stems and small or few leaves, that is cultivated for its profusion of flowers.

blue lupine - noun. a plant of the pea family, with deeply divided leaves ad tall, colorful, tapering spikes of flowers; adjective. of, like, or relating to a wolf or wolves

bee-orchis - noun. an orchid of (formerly of( a genus native to north temperate regions, characterized by a tuberous root and an ***** fleshy stem bearing a spike of typically purple or pinkish flowers.

campo santo - translation. cemetery in Italian and Spanish

runnel - noun. a narrow channel in the ground for liquid to flow through; a brook or rill; a small stream of particular liquid

arroyos - noun. a steep-sided gully cut by running water in an arid or semi-arid region.


January 14th, 2014

spline - noun. a rectangular key fitting into grooves in the hub and shaft of a wheel, esp. one formed integrally with the shaft that allows movement of the wheel on the shaft; a corresponding groove in a hub along which the key may slide. 2. a slat; a flexible wood or rubber strip used, esp. in drawing large curves. 3. (also spline curve) Mathematics. a continuous curve constructed so as to pass through a given set of points and have a certain number of continuous derivatives.

4. verb. secure (a part) by means of a spine

reticulate - verb. rare. divide or mark (something) in such a way as to resemble a net or network

November 20, 2013

flout - verb. openly disregard (a rule, law, or convention); intrans. archaic. mock; scoff ORIGIN: mid 16th cent.: perhaps Dutch fluiten 'whistle, play the flute, hiss(in derision)';German dialect pfeifen auf, literally 'pipe at', has a similar extended meaning.

pedimented - noun. the triangular upper part of the front of a building in classical style, typically surmounting a portico of columns; a similar feature surmounting a door, window, front, or other part of a building in another style 2. Geology. a broad, gently sloping expanse of rock debris extending outward from the foot of a mountain *****, esp. in a desert.

portico - noun. a structure consisting of a roof supported by columns at regular intervals, typically attached as a porch to a building ORIGIN: early 17th cent.: from Italian, from Latin porticus 'porch.'

catafalque - noun. a decorated wooden framework supporting the coffin of a distinguished person during a funeral or while lying in state.

cortege - noun. a solemn procession esp. for a funeral

pall - noun. a cloth spread over a coffin, hearse, or tomb; figurative. a dark cloud or covering of smoke, dust, or similar matter; figurative. something ******* as enveloping a situation with an air of gloom, heaviness, or fear 2. an ecclesiastical pallium; heraldry. a Y-shape charge representing the front of an ecclesiastical pallium. ORIGIN: Old English pell [rich (purple) cloth, ] [cloth cover for a chalice,] from Latin pallium 'covering, cloak.'

3. verb. [intrans.] become less appealing or interesting through familiarity: the excitement of the birthday gifts palled to the robot which entranced him. ORIGIN: late Middle English; shortening of APPALL

columbarium - noun. (pl. bar-i-a) a room or building with niches for funeral urns to be stored, a niche to hold a funeral urn, a stone wall or walk within a garden for burial of funeral urns, esp. attached to a church. ORIGIN: mid 18th cent.: from Latin, literally 'pigeon house.'

balefire - noun. a lare open-air fire; a bonfire.

eloge - noun. a panegyrical funeral oration.

panegyrical - noun. a public speech or published text in praise of someone or something

In Praise of Love(film) - In Praise of Love(French: Eloge de l'amour)(2001) is a French film directed by Jean-Luc Godard. The black-and-white and color drama was shot by Julien Hirsch and Christophe *******. Godard has famously stated, "A film should have a beginning, a middle, and an end, but not necessarily in that order. This aphorism is illustrated by In Praise of Love.

aphorism - noun. a pithy observation that contains a general truth, such as, "if it ain't broke, don't fix it."; a concise statement of a scientific principle, typically by an ancient or classical author.

elogium - noun. a short saying, an inscription. The praise bestowed on a person or thing; a eulogy

epicede - noun. dirge elegy; sorrow or care. A funeral song or discourse, an elegy.

exequy - noun. plural ex-e-quies. usually, exequies. Funeral rites or ceremonies; obsequies. 2. a funeral procession.

loge - noun. (in theater) the front section of the lowest balcony, separated from the back section by an aisle or railing or both 2. a box in a theater or opera house 3. any small enclosure; booth. 4. (in France) a cubicle for the confinement of art  students during important examinations

obit - noun. informal. an obituary 2. the date of a person's death 3. Obsolete. a Requiem Mass

obsequy - noun. plural ob-se-quies. a funeral rite or ceremony.

arval - noun. A funeral feast ORIGIN: W. arwy funeral; ar over + wylo, 'to weep' or cf. arf["o]; Icelandic arfr: inheritance + Sw. ["o]i ale. Cf. Bridal.

knell - noun. the sound made by a bell rung slowly, especially fora death or a funeral 2. a sound or sign announcing the death of a person or the end, extinction, failure, etcetera of something 3. any mournful sound 4. verb. (used without object). to sound, as a bell, especially a funeral bell 5. verb. to give forth a mournful, ominous, or warning sound.

bier - noun. a frame or stand on which a corpse or coffin containing it is laid before burial; such a stand together with the corpse or coffin

coronach - noun. (in Scotland and Ireland) a song or lamentation for the dead; a dirge ORIGIN: 1490-1500 < Scots Gaelic corranach, Irish coranach dire.

epicedium - noun. plural epicedia. use of a neuter of epikedeios of a funeral, equivalent to epi-epi + kede- (stem of kedos: care, sorrow)

funerate - verb. to bury with funeral rites

inhumation - verb(used with an object). to bury

nenia - noun. a funeral song; an elegy

pibroch - noun. (in the Scottish Highlands) a piece of music for the bagpipe, consisting of a series of variations on a basic theme, usually martial in character, but sometimes used as a dirge

pollinctor - noun. one who prepared corpses for the funeral

saulie - noun. a hired mourner at a funeral

thanatousia - noun. funeral rites

ullagone - noun. a cry of lamentation; funeral lament. also, a cry of sorrow ORIGIN: Irish-Gaelic

ulmaceous - of or like elms

uloid - noun. a scar

flagon - noun. a large bottle for drinks such as wine or cide

ullage - noun. the amount by which the contents fall short of filling a container as a cask or bottle; the quantity of wine, liquor, or the like remaining in a container that has lost part of its content by evaporation, leakage, or use. 3. Rocketry. the volume of a loaded tank of liquid propellant in excess of the volume of the propellant; the space provided for thermal expansion of the propellant and the accumulation of gases evolved from it

suttee - (also, sati) noun. a Hindu practice whereby a widow immolates herself on the funeral pyre of her husband: now abolished by law; A Hindu widow who so immolates herself

myriologue - noun. the goddess of fate or death. An extemporaneous funeral song, composed and sung by a woman on the death of a friend.

threnody - noun. a poem, speech, or song of lamentation, especially for the dead; dirge; funeral song

charing cross - noun. a square and district in central London, England: major railroad terminals.

feretory - noun. a container for the relics of a saint; reliquary. 2. an enclosure or area within a church where such a reliquary is kept 3. a portable bier or shrine

bossuet - noun. Jacques Benigne. (b. 1627-1704) French bishop, writer, and orator.

wyla -

rostrum -

aaron's rod -

common mullein -

verbascum thapsus -

peignoir -

pledget -

vestiary -

bushhamer -

beneficiation -

keeve -

frisure -

castigation -

slaw -

strickle -

vestry -

iodoform -

moslings -

bedizenment -

pomatum -

velure -

apodyterium -

macasser oil -

equipage -

tendance -

bierbalk -

joss paper -

lichgate -

parentation -

prink -

bedizen -

allogamy -

matin -

dizen -

disappendency -

photonosus -

spanopnoea -

abulia -

sequela -

lagophthalmos -

cataplexy -

xerasia -

anophelosis -

chloralism -

chyluria -

infarct -

tubercle -

pyuria -

dyscrasia -

ochlesis -

cachexy -

abulic -

sthenic - adjective. dated Medicine. of or having a high or excessive level of strength and energy

pinafore -

toff -

swain -

bucentaur -

coxcomb -

fakir -

hominid -

mollycoddle -

subarrhation -

surtout -

milksop -

tommyrot -

ginglymodi -

harlequinade -

jackpudding -

pickle-herring -

japer -

golyardeys -

scaramouch -

pantaloon -

tammuz -

cuckold -

nabob -

gaffer -

grass widower -

stultify -

stultiloquence -

batrachomyomachia -

exsufflicate -

dotterel -

fadaise -

blatherskite -

footling -

dingmat -

shlemiel -

simper -

anserine -

flibbertgibbet -

desipient -

nugify -

spooney -

inaniloquent -

liripoop -

******* -

seelily -

stulty -

taradiddle -

thimblewit -

tosh -

gobemouche -

hebephrenia -

cockamamie -

birdbrained -

featherbrained -

wiseacre -

lampoon -

Guy Fawke's night -

maclean -

vang -

wisenheimer -

herod -

vertiginous -

raillery -

galoot -

camus -

gormless -

dullard -

funicular -

duffer -

laputan -

fribble -

dolt -

nelipot -

discalced -

footslog -

squelch -

coggle -

peregrinate -

pergola -

gressible -

superfecundation -

mufti -

reveille -

dimdl -

peplum -

phylactery -

moonflower -

bibliopegy -

festinate -

doytin -

****** -

red trillium -

reveille - noun. [in sing. ] a signal sounded esp. on a bugle or drum to wake personnel in the armed forces.

trillium - noun. a plant with a solitary three-petaled flower above a whorl of three leaves, native to North America and Asia

contrail - noun. a trail of condensed water from an aircraft or rocket at high altitude, seen as a white streak against the sky. ORIGIN: 1940s: abbreviation of condensation trail. Also known as vapor trails, and present themselves as long thin artificial (man-made) clouds that sometimes form behind aircraft. Their formation is most often triggered by the water vapor in the exhaust of aircraft engines, but can also be triggered by the changes in air pressure in wingtip vortices or in the air over the entire wing surface. Like all clouds, contrails are made of water, in the form of a suspension of billions of liquid droplets or ice crystals. Depending on the temperature and humidity at the altitude the contrail forms, they may be visible for only a few seconds or minutes, or may persist for hours and spread to be several miles wide. The resulting cloud forms may resemble cirrus, cirrocumulus, or cirrostratus. Persistent spreading contrails are thought to have a significant effect on global climate.

psychopannychism -

restoril -

temazepam -

catafalque -

obit -

pollinctor -

ullagone -

thanatousia -

buckram -

tatterdemalion - noun. a person in tattered clothing; a shabby person. 2. adjective. ragged; unkempt or dilapidated

curtal - adjective. archaic. shortened, abridged, or curtailed; noun. historical. a dulcian or bassoon of the late 16th to early 18th century.

dulcian - noun. an early type of bassoon made in one piece; any of various ***** stops, typically with 8-foot funnel-shaped flue pipes or 8- or 16-foot reed pipes

withe - noun. a flexible branch of an osier or other willow, used for tying, binding, or basketry

osier - noun. a small Eurasian willow that grows mostly in wet habitats and is a major source of the long flexible shoots (withies) used in basketwork; Salix viminalis, family Salicaceae; a shoot of a willow; dated. any willow tree 2. noun. any of several North American dogwoods.

directoire - adjective. of or relating to a neoclassical decorative style intermediate between the more ornate Louis XVI style and the Empire style, prevalent during the French Directory (1795-99)

guimpe -

ip
dictionary wordlist list lists word words definition definitions wordplay play fun game paragraph language english chicago loveofwords languagelove love beauty peace yew mew sheep colors curiosity logolepsy
Fah  Aug 2013
Untitled
Fah Aug 2013
(via phatphilosophers)

(via phatphilosophers)

(via phatphilosophers)
jeffrey-lebowski:

Untitled by Yayoi Kusama.
Acrylic on canvas, 45.5 x 38.0 cm. Signed and dated 1993
jeffrey-lebowski:
Untitled by Yayoi Kusama.
Acrylic on canvas, 45.5 x 38.0 cm. Signed and dated 1993
(via phatphilosophers)

These are the days that must happen to you.
Walt Whitman, from Leaves Of Grass (via violentwavesofemotion)
(via phatphilosophers)
18 HOURS AGO / LARMOYANTE
axiatonal:

Canola Flowers Field, China
axiatonal:
Canola Flowers Field, China
(via awaveofbliss)

(via awaveofbliss)

whatisadvertising:
What would modern technology and social networks look like if they were vintage ads
This is a post gathered Facebook, Twitter, Youtube, Skype, iMac, Nintendo Wii and Sony Playstation as if they were vintage ads.
(via thebronxisburning)
aplacetofindlife:

Someone Should Start Laughing
I have a thousand brilliant lies For the question: How are you?  I have a thousand brilliant lies For the question: What is God? If you think that the Truth can be known From words, If you think that the Sun and the Ocean Can pass through that tiny opening Called the mouth,
O someone should start laughing! Someone should start wildly Laughing Now!- Hafiz
aplacetofindlife:
Someone Should Start Laughing

I have a thousand brilliant lies
For the question:
How are you?

I have a thousand brilliant lies
For the question:
What is God?

If you think that the Truth can be known
From words,

If you think that the Sun and the Ocean
Can pass through that tiny opening Called the mouth,

O someone should start laughing!
Someone should start wildly Laughing Now!

- Hafiz
(via cosmic-rebirth)

meditationsinwonderland:
Chimamanda Ngozi Adiche, We Should All Be Feminists
How could I not reblog this?
(Source: bakongo)
1 day ago – 234,004 notes

artismyempire:
gentledom:
A wonderful analogy.
What I shall do today.
(Source: boyqueen, via thebronxisburning)
1 day ago – 30,054 notes

(Source: maryhadalittleblunt, via awaveofbliss)
1 week ago – 81 notes
beachsloth:

SYNESTHESIA by Joshua Espinoza
                God watches everyone’s first kiss. Although God used to be an awesome God He’s been a bit lazier as the years have progressed. Long ago God felt that raining frogs on Egypt was cool. People were turned into pillars of salt for looking at the destruction of their towns. Now God isn’t into that whole vengeful thing. Rather He realizes the importance of free will and understands it is more important than any instruction manual.
                Dreams are the ultimate instructional manual. Sub-conscious hates being a sub. Sub-conscious wants to be dom-conscious. Unfortunately such things do not happen anymore. Drinking dreams from people is potentially delicious. Flab is the hallmark of a family man or woman. Their dreams have become realities. Mere impulses of creatures become vaguely self-sustaining then fully self-sustaining. Right in the heart is where the familial love lives. Floaters in the eyes are more than floaters. When one sees floaters they see ghosts. Floaters are ghosts for the vision-impaired.
                Afterlife is big into God. Death brings people closer to God. They live in God’s domain hoping for the best. From on high the angels live on the down low. Beneath angels are the exciting ones, the ones they can and do mess up. Humans are interesting for their ability to mess up all the time and somehow remain completely loved. Every human is made in God’s image. Once people come back to God they realize how much of their decisions were good, how the evil was more than counterbalanced by the good. Living in Earth tends to make people forget how fortunate they really are.
                The world hates leaving people behind. In Heaven everything is fine. From Heaven people can see themselves from light-years away. Such distance makes it easier to see what the right and wrong decision was. Death takes the people away. Online presences remain long after the body has left. Everything has a digital footprint entirely different from their real life footprint. Sometimes it is bigger and sometimes smaller. It depends on the lust for life.
                Kissing is a form of lust. Lips love each other. Lips like locking together. That is where the key to the heart comes from, from the lips. Words flow from the mouths of babes. Life means the words work well but the tones work better. Even babies understand the importance of tone. Words are meaningless. Tones are tender. People wrap themselves up in tones, in the environmental sounds that surround them for that is what it means to be alive: it means to interact.
beachsloth:
SYNESTHESIA by Joshua Espinoza
                God watches everyone’s first kiss. Although God used to be an awesome God He’s been a bit lazier as the years have progressed. Long ago God felt that raining frogs on Egypt was cool. People were turned into pillars of salt for looking at the destruction of their towns. Now God isn’t into that whole vengeful thing. Rather He realizes the importance of free will and understands it is more important than any instruction manual.
                Dreams are the ultimate instructional manual. Sub-conscious hates being a sub. Sub-conscious wants to be dom-conscious. Unfortunately such things do not happen anymore. Drinking dreams from people is potentially delicious. Flab is the hallmark of a family man or woman. Their dreams have become realities. Mere impulses of creatures become vaguely self-sustaining then fully self-sustaining. Right in the heart is where the familial love lives. Floaters in the eyes are more than floaters. When one sees floaters they see ghosts. Floaters are ghosts for the vision-impaired.
                Afterlife is big into God. Death brings people closer to God. They live in God’s domain hoping for the best. From on high the angels live on the down low. Beneath angels are the exciting ones, the ones they can and do mess up. Humans are interesting for their ability to mess up all the time and somehow remain completely loved. Every human is made in God’s image. Once people come back to God they realize how much of their decisions were good, how the evil was more than counterbalanced by the good. Living in Earth tends to make people forget how fortunate they really are.
                The world hates leaving people behind. In Heaven everything is fine. From Heaven people can see themselves from light-years away. Such distance makes it easier to see what the right and wrong decision was. Death takes the people away. Online presences remain long after the body has left. Everything has a digital footprint entirely different from their real life footprint. Sometimes it is bigger and sometimes smaller. It depends on the lust for life.
                Kissing is a form of lust. Lips love each other. Lips like locking together. That is where the key to the heart comes from, from the lips. Words flow from the mouths of babes. Life means the words work well but the tones work better. Even babies understand the importance of tone. Words are meaningless. Tones are tender. People wrap themselves up in tones, in the environmental sounds that surround them for that is what it means to be alive: it means to interact.
(via bluishtigers)
1 week ago – 74 notes

(Source: samsaranmusing)
1 week ago – 78 notes
maymonsturr:

My mantra.
maymonsturr:
My mantra.
(via cosmic-rebirth)
1 week ago – 568 notes
foxxxynegrodamus:

***
foxxxynegrodamus:
***
(Source: lnpfeed, via awaveofbliss)
1 week ago – 1,635 notes
cosmic-rebirth:

Live joyfully, make your life a dance, all the way to the grave.
cosmic-rebirth:
Live joyfully, make your life a dance, all the way to the grave.
(Source: cookiecarnival)
2 weeks ago – 22,305 notes
“The point is not to pay back kindness but to pass it on.”
– Julia Alvarez (via cosmic-rebirth)
(Source: amandaonwriting, via cosmic-rebirth)
2 weeks ago – 275 notes

(Source: diawf, via awaveofbliss)
2 weeks ago – 2,799 notes
bl4ckhippie:

Fly.
bl4ckhippie:
Fly.
(Source: rootsrukkus, via awaveofbliss)
2 weeks ago – 750 notes

(Source: lizzlizzcomics, via bluishtigers)
2 weeks ago – 110,456 notes
meditationsinwonderland:

ॐ flower child in Wonderland ॐ
meditationsinwonderland:
ॐ flower child in Wonderland ॐ
(Source: vegan-hippie)
2 weeks ago – 139,177 notes

(Source: jrich103, via cosmic-rebirth)
2 weeks ago – 4,848 notes

pleoros:
Helminadia Ranford - Guilin,China
(via hungryforworld)
2 weeks ago – 329 notes
designgather:

Oak Room
Andy Goldsworthy
designgather:
Oak Room
Andy Goldsworthy
(via cosmic-rebirth)
2 weeks ago – 286 notes
miguu:
don’t be afraid.
lean into your genius.
let your own brilliance support you.
you are something
we have all been waiting to know.
please.
(via bluishtigers)
2 weeks ago – 339 notes

odditiesoflife:
Amazing Jabuticaba Tree
This is an incredible tree that bears its fruit directly on the main trunks and branches of the plant, lending a distinctive appearance to the fruiting tree. The jabuticaba (Plinia cauliflora) is a fruit-bearing tree native to Minas Gerais and São Paulo in southeastern Brazil. Otherwise known as the Brazilian Grape Tree, the jabuticaba is grown for its purplish-black, white-pulped fruits. They can be eaten raw or be used to make jellies and drinks, including juice and wine.
They are wonderful trees to have and are fairly adaptable to most environments but they grow extremely slow. Jabuticaba flowers are white and grow directly from its trunk, just like its fruit. The tree may flower and fruit only once or twice a year, but when continuously irrigated, it flowers frequently and fresh fruit can be available year round in tropical regions.
Common in Brazilian markets, jabuticabas are largely eaten fresh; their popularity has been likened to that of grapes in the US. Due to its extremely short shelf-life, fresh jabuticaba fruit is very rare in markets outside of areas of cultivation. So if you are ever in Brazil, be sure to try the incredibly tasty fruit called jabuticaba.
source 1, 2
(via hungryforworld)
2 weeks ago – 1,462 notes

(Source: samsaranmusing)
2 weeks ago – 118 notes

(Source: rorycwhatsyourthesis, via samsaranmusing)
2 weeks ago – 130,113 notes
oecologia:

Star Trails over Matterhorn (Switzerland) by Felix Lamouroux.
oecologia:
Star Trails over Matterhorn (Switzerland) by Felix Lamouroux.
(via samsaranmusing)

burningveins:
multicolors:
benskid:
Know where you stand.
Wow
This is kinda creepy..
(via hungryforworld)

Do not think you will necessarily be aware of your own enlightenment.
Zen Master Dogen - (1200- 1253) AD (via samsaranmusing)
2 WEEKS AGO
101fuymemes:

COLLECTION OF awesome CLOUDS
101fuymemes:
COLLECTION OF awesome CLOUDS
(via roslynoberholtzerbddd)

itscolossal:
Planetary Structural Layer Cakes Designed by Cakecrumbs

Do not resist events that move you out of your comfort zone, especially when your comfort zone was not all that comfortable.
Alan Cohen (via raeraenjma)
(via awaveofbliss)
4 WEEKS AGO / THE-HEALING-NEST
so apt
so apt
(via awaveofbliss)

(via awaveofbliss)
treewellie:

"The area between Kluane Lake and Haines Junction, Yukon, skirting the great cordillera of the Wrangell / St. Elias Mtn. range, is commonly productive of these stacked lenticular clouds … In late summer, as the sun begins to set around 11 PM, it’s beautiful to see these unique clouds, which are higher in altitude than their surrounding companions, catching the last peach coloured rays of the sun."
treewellie:
"The area between Kluane Lake and Haines Junction, Yukon, skirting the great cordillera of the Wrangell / St. Elias Mtn. range, is commonly productive of these stacked lenticular clouds … In late summer, as the sun begins to set around 11 PM, it’s beautiful to see these unique clouds, which are higher in altitude than their surrounding companions, catching the last peach coloured rays of the sun."
definitelydope:

BBQ on the balcony (by fernlicht)
definitelydope:
BBQ on the balcony (by fernlicht)
(via awaveofbliss)

Birth by Alex Grey
Birth by Alex Grey
(via receptive)

(via bluishtigers)

(via awaveofbliss)

There is a time and place for decaf coffee. Never and in the trash.
(via 17yr)
(via hungryforworld)
1 MONTH AGO / MIDWESTRAISEDMIDWESTLIVING
surreelust:

Man with His Skin by Peter Zokosky
surreelust:
Man with His Skin by Peter Zokosky
(via cosmic-rebirth)

Oh soul,
you worry too much.
You have seen your own strength.
You have seen your own beauty.
You have seen your golden wings.
Of anything less,
why do you worry?
You are in truth
the soul, of the soul,
of the soul.
Rumi, from Who Am I?   (via bluishtigers)
(via bluishtigers)
1 MONTH AGO / VIOLENTWAVESOFEMOTION
xpudding:

xpudding:
(via cosmic-rebirth)

(via thebronxisburning)

(via cosmic-rebirth)
treewellie:

La costa de la luz by Francisco Mingorance
treewellie:
La costa de la luz by Francisco Mingorance

itscolossal:
Mirror City: A Kaleidoscopic Timelapse of Chicago, San Francisco, San Diego, Vegas and L.A. [VIDEO]

(via cosmic-rebirth)

awkwardsituationist:
gmb akash documents the 350 kilometre journey from dhaka to sylhet, bangladesh made by those who, unable to afford the price of a ticket or find room to ride inside, risk death by traveling atop and between train cars
(via suntochukwu)
purpleaggregates:

White Tara The female enlightened being of long life, wisdom and good fortune When I see the signs of untimely death, May I immediately receive the blessings of Arya Tara; And, having destroyed the Lord of Death, May I quickly attain the deathless vajra body. OM TARE TUTTARE TURE MAMA AYUR PUNAYE GYANA PUTRIM KURU YE SÖHA OM TARE TUTTARE TURE SÖHA
purpleaggregates:
White Tara
The female enlightened being of long life, wisdom and good fortune

When I see the signs of untimely death,
May I immediately receive the blessings of Arya Tara;
And, having destroyed the Lord of Death,
May I quickly attain the deathless vajra body.

OM TARE TUTTARE TURE MAMA AYUR PUNAYE GYANA PUTRIM KURU YE SÖHA
OM TARE TUTTARE TURE SÖHA
(via dancingdakini)

(via guerrillatech)
hungryforworld:

Monet’s Garden. Givery, France.
hungryforworld:
Monet’s Garden. Givery, France.

(via awaveofbliss)

(via cosmic-rebirth)

Internal and external are ultimately one. When you no longer perceive the world as hostile, there is no more fear, and when there is no more fear, you think, speak and act differently. Love and compassion arise, and they affect the world.
Eckhart Tolle (via samsaranmusing)
(via suntochukwu)
1 MONTH AGO / SAMSARANMUSING
malformalady:

The golden spiral of fungus. In geometry, a golden spiral is a logarithmic spiral whose growth factor is φ, the golden ratio. That is, a golden spiral gets wider (or further from its origin) by a factor of φ for every quarter turn it makes.
Photo credit: Devin Raber
malformalady:
The golden spiral of fungus. In geometry, a golden spiral is a logarithmic spiral whose growth factor is φ, the golden ratio. That is, a golden spiral gets wider (or further from its origin) by a factor of φ for every quarter turn it makes.
Photo credit: Devin Raber
(via deeperthansoul)
polaroidsf:

Welcome to Eden
polaroidsf:
Welcome to Eden

(via bouddra)

It doesn’t interest me what you do for a living.
I want to know what you ache for, and if you dare to dream of
meeting your heart’s longing.

It doesn’t interest me how old you are.
I want to know if you will risk looking like a fool for love, for
your dreams, for the adventure of being alive.

It doesn’t interest me
By
Alexander K Opicho

(Eldoret, Kenya; aopicho@yahoo.com)


Spiritual scholars of Christian Science have a concept that there is
power in the name. They at most identify the name Jesus and the name
of God, Jehovah to be the most powerful names in the spiritual realm.
But in the world of literature and intellectual movement, art,
science, politics and creativity, the name Alexander is mysteriously
powerful. Averagely, bearers of the name Alexander achieve some unique
level of literary or intellectual glory, discover something novel or
make some breakaway political victories.

Among the ancient and present-day Russians, most bearers of the name
Alexander were imbued with some uniqueness of intellect, leadership or
literary mighty. Beginning with the recent times of Russia, the first
mysterious Alexander is the 1700 political reformist and effective
leader, Tsar Alexander and his beautiful wife, tsarina Alexandrina.
The couple transformed Russian society from pathetic peasantry to a
middle class society. It is Tsar Alexander’s leadership that lain a
foundation for Russian socialist revolution. Different scholars of
Russian history remember the reign of Tsar Alexander with a strong

bliss. This is what made the Lenin family to name their son Alexander
an elder brother to Vladimir Ilyanovsk Ilyich Lenin. This was done as
parental projection through careful   choice of a mentor for their
young son. Alexander Lenin was named after this formidable ruler; Tsar
Alexander. Alexander Lenin was a might scholar. An Intellectual and
political reformist. He was a source of inspiration to his young
brother Vladimir Ilyich Lenin, who became the Russian president after
his brother Alexander, had died through political assassination.
However, researches into distinctive prowess of these two brothers
reveal that Alexander Lenin was more gifted intellectually than
Vladimir Lenin.

Alexander Pushkin, another Russian personality with intellectual,
cultural, theatrical and   literary consenguences. He was a
contemporary of Alexander pope. He is the main intellectual influence
behind Nikolai Vasileyvich Gogol and very many other Russian writers.
He is to Russians what Shakespeare is to English speakers or victor
Hugo is to French speakers, Friedriech schiller and Frantz Kafka is to
Germany readers or Miguel de Cervantes to the Spaniards. Among English
readers, Shakespeare’s drama of king Lear is a beacon of English
political theatre, while Hugo’s Les miscerables is an apex of French
social and political literature, but Pushkin’s Boris Godunov, a
theatrical political satire, technically towers above the peers. For
your point of information my dear reader; there has been a
commonaplace false convention among English literature scholars that,
William Shakespeare in conjunction with Robert Greene wrote and
published highest number of books, more than anyone else. The factual
truth is otherwise. No, they only published 90 works, but Pushkin
published 700 works.
Equally glorious is Alexander Vasileyvich sholenstsyn,the, the, the
author of I will be on phone by five, Cancer Ward, Gulag Archipelago’
and the First Cycle. He is a contemporary of Leo Tolstoy, Fyodor
Dostoyevsky, Alfred Nobel and Maxim Gorky. Literary and artistic
excellence of Alexander Sholenstsyn,the, the anti-communist Russian
novelist was and is still displayed through his mirroring of a corrupt
Russian communist politics, made him a debate case among the then
committee members for Nobel prize and American literature prize, but
when the Kremlin learned of this they, detained Alexander sholenenstyn
at Siberia for 18 years this is where he wrote his Gulag Archipelago.
Which he wrote as sequel five years later to the previous novel the
Cancer Ward whose main theme is despair among cancer patients in the
Russian hospitals. This was simply a satirical way of expressing agony
of despair among the then political prisoners at Siberia concentration
camps .In its reaction to this communist front to capitalist
literature through the glasnost machinery, the Washington government
ordered chalice Chaplin an American pro-communist writer to be out of
America within 45 minutes.
Alexander’s; Payne, Pato, Petrovsky, and Pires are intellectual
torchbearers of the world and Russian literary civilization. Not to
forget, Alexander Popov, a poet and Russian master brewer, whose
liquor brand ‘Popov’ is the worldwide king of bar shelves?
In 1945 the Russians had very brutish two types of guns, designed to
shoot at long range with very little chances of missing the target.
These guns are; AK 47 and the Molotov gun. They were designed to
defeat the German **** and later on to be used in international
guerrilla movement. The first gun AK 47 was designed by Alexander
klashilinikov and the second by Alexander Molotov. These are the two
Alexander’s that made milestones in history of world military
technology.
The name Alexander was one of the titles or the epithet used to be
given to the Greek goddess Hera and as such is taken to mean the one
who comes to save warriors. In Homer’s epical work; the Iliad, the
most dominant character Paris who often saved the other warriors was
also known also as Alexander. This name’s linkage to popularity was
spread throughout the Greek world by the military maneuvers and
conquests of King Alexander III. Alexander III is commonly known as
Alexander the Great .  Evidently; the biblical book of Daniel had a
prophecy. It was about fall of empires down to advent of Jesus as a
final ruler. The prophecy venerated Roman Empire above all else. As
well the, prophecy magnified military brilliance, intellect and
leadership skills of the Greek, Alexander the great, the conqueror of
Roman Empire. Alexander the great was highly inspired by the secret
talks he often held with his mother. All bible readers and historians
have reasons to believe that Alexander of Greece was powerful,
intellectually might, strong in judgment and a political mystery and
enigma that remain classic to date.
In his book Glimpses of History, jewarlal Nehru discusses the Guru
Nanak as an Indian religious sect, Business Empire, clan, caste, and
an intellectual movement of admirable standard that shares a parrell
only with the Aga Khans. Their   founder is known, as Skander Nanak
.The name skander is an Indian version for Alexander. Thus, Alexander
Nanak is the founder of Guru Nanak business empire and sub Indian
spiritual community. Alexander Nanak was an intellectual, recited
Ramayana and Mahabharata off head; he was both a secular and religious
scholar as well as a corporate strategist.
The American market and industrial civilsations has very many
wonderful Alexander’s in its history. The earliest known Alexander in
American is Hamilton, the poet, writer, politician and political
reformist. Hamilton strongly worked for establishment of American
constitution. Contemporaries of Hamilton are; Alexander graham bell
and Alexander flemming.bell is the American scientist who discovered a
modern electrical bell, while Fleming, A Nobel Prize Laureate
discovered that fungus on stale bread can make penicillin to be used
in curing malaria. Other American Alexander’s are; wan, Ludwig,
Macqueen, Calder and ovechikin.
Italian front to mysterious greatness in the name Alexander
spectacularly emanates from science of electricity which has a
measuring unit for electrical volume known as voltage. The name of
this unit is a word coined from the Italian name Volta. He was an
Italian scientist by the name Alesandro Volta. Alesandro is an Italian
version for Alexander. Therefore it is Alexander Volta an Italian
scientist who discovered volume of electrical energy as it moves along
the cable. Thus in Italian culture the name Alexander is also a
mystery.
Readers of European genre and classics agree that it is still
enjoyfull to read the Three Musketeers and the Poor Christ of
Montecristo for three or even more times. They are inspiring, with a
depth of intellectual character, and classic in lessons to all
generations. These two classics were written by Alexander Dumas, a
French literary genious.he lived the same time as Hugo and
Dostoyevsk.when Hugo was writing the Hunch-back of Notredame Dumas was
writing the Three Musketeers. These two books were the source of
inspiration for Dostoyevsky to write Brothers Karamazov. Another
notable European- *** -American Alexander is  Alexander pope, whose
adage ‘short knowledge is dangerous,’ has remained a classic and ever
quoted across a time span of two centuries. Alexander pope penned this
line in the mid of 1800 in his poem better drink from the pyrene
spring.

In the last century colleges, Universities and high schools in Kenya
and throughout Africa, taught Alexander la Guma and Alexander Haley as
set- book writers for political science, literature and drama courses.
Alexander la Guma is a South African, ant–apartheid crusader and a
writer of strange literary ability. His commonly read books are A walk
in the Night, Time of the Butcher Bird and In the Fog of the Season’s
End. While Alexander Haley is an African in the American Diaspora. An
intellectual heavy- weight, a politician, civil a rights activist and
a writer of no precedent, whose book The Roots is a literary
blockbuster to white American artists. Both la Guma and Haley are
African Alexander’s only that white bigotry in their respective
countries of America and South Africa made them to be called Alex’s.
The Kenyan only firm for actuaries is Alexander Forbes consultants.
Alexander Forbes was an English-American mathematician. The lesson
about Forbes is that mystery within the name Alexander makes it to be
the brand of corporate actuarial practice in Africa and the entire
world.
Something hypothetical and funny about this name Alexander is that its
dictionary definition is; homemade brandy in Russia, just the way the
east African names; Wamalwa, Wanjoi and Kimaiyo are used among the
Bukusu, Agikuyu and Kalenjin communities of Kenya respectively. More
hypothetical is the lesson that the short form of Alexander is Alex;
it is not as spiritually consequential in any manner as its full
version Alexander. The name Alex is just plain without any powers and
spiritual connotation on the personality and character of the bearer.
The name Alexander works intellectual miracles when used in full even
in its variants and diminutives as pronounced in other languages that
are neither English nor Greece. Presumably the - ander section of the
name (Alex)ander is the one with life consequences on the history of
the bearer. Also, it is not clear whether they are persons called
Alexander who are born bright and gifted or it is the name Alexander
that conjures power of intellect and creativity on them.
In comparative historical scenarios this name Alexander has been the
name of many rulers, including kings of Macedon, kings of Scotland,
emperors of Russia and popes, the list is infinite. Indeed, it is bare
that when you poke into facts from antiques of politics, religion and
human diversity, there is rich evidence that there is substantial
positive spirituality between human success and social nomenclature in
the name of Alexander. Some cases in archaic point are available in a
listological exposition of early rulers on Wikipedia. Some names on
Wikipedia in relation to the phenomenon of Alexanderity are: General
Alexander; more often known as Paris of Troy as recounted by Homer in
his Iliad. Then ensues a plethora; Alexander of Corinth who was the
10th king of Corinth , Alexander I of Macedon, Alexander II of
Macedon, Alexander III of Macedonia alias  Alexander the Great. There
is still in the list in relation to Macedonia, Alexander IV  and
Alexander V. More facts of the antiques have   Alexander of Pherae who
was the despotic ruler of Pherae between 369 and 358 before the Common
Era. The land of Epirus had Alexander I the king of Epirus about 342
before the Common Era and Alexander II  the king of Epirus 272 before
the Common Era. A series of other Alexander’s in the antiques is
composed of ; Alexander the  viceroy of Antigonus Gonatas and also the
ruler of a **** state based on Corinth in 250 before the common era,
then Alexander Balas, ruler of the Seleucid kingdom of Syria between
150 and 146 before the common era . Next in the list is  Alexander
Zabinas the ruler of part of the Seleucid kingdom of Syria based in
Antioch between 128 and 123  before the common era ,  then Alexander
Jannaeus king of Judea, 103 to 76  before the common era  and last but
not least  Alexander of Judaea  son of Aristobulus  II the  king of
Judaea .  The list of Alexander’s in relation to the antiquated  Roman
empire are; Alexander Severus, Julius Alexander who lived during the
second  century as the Emesene nobleman, Then next is Domitius
Alexander the Roman usurper who declared himself emperor in 308. Next
comes Alexander the emperor of Byzantine. Political antiques of
Scotland have Alexander I , Alexander II and Alexander III of Scotland
. The list cannot be exhausted but it is only a testimony that there
are a lot of Alexander’s in the antiques of the world.
Religious leadership also enjoys vastness of Alexander’s. This is so
among the Christians and non Christians, Catholics and Protestants and
even among the charismatic and non-charismatic. These historical
experiences start with Alexander kipsang Muge the Kenyan Anglican
Bishop who died in a mysterious accident during the Kenyan political
dark days of Moi. But when it comes to  The antiques  catholic
pontifical history, there is still a plethora of them as evinced on
Wikipedia ; Pope Alexander I , Alexander of Apamea also the  bishop of
Apamea, Pope Alexander II ,Pope Alexander III, Pope Alexander IV, Pope
Alexander V, Pope Alexander VI, Pope Alexander VII, Pope Alexander
VIII, Alexander of Constantinople the bishop of Constantinople , St.
Alexander of Alexandria also the  Coptic Pope and Patriarch of
Alexandria between  then Pope Alexander II of Alexandria the  Coptic
Pope  and lastly Alexander of Lincoln the bishop of Lincoln and
finally  Alexander of Jerusalem.
However, the fact of logic is inherent in the premise that there is
power in the name .An interesting experience I have had is that; when
Eugene Nelson Mandela ochieng was kidnapped in Nairobi sometimes ago,
a friend told me that there is power in the name. The name Mandela on
a Nairobi born Luo boy attracts strong fortune and history making
eventualities towards the boy, though fate of the world interferes,
the boy Eugene Mandela ochieng is bound to be great, not because he
was kidnapped but because he has an assuring name Nelson Mandela. With
extension both in Africa and without ,May God the almighty add all
young Alexander’s to the traditional list of other great and
formidable  Alexander’s that came before. Amen.

References;
Jewarlal Nehru; Glimpses of History


Alexander K Opicho is a social researcher with Sanctuary Researchers
ltd in Eldoret, Kenya he is also a lecturer in Research Methods in
governance and Leadership.
Pieces of me
thrown away
like trash
Never consulted
Never asked
The direct result
of another’s conviction
or more commonly seen
consequences
from blind ambition

Paranoid
The fix is in
But no invitation
for me,
former me
or forever me
and all of my imitations
beset by my
limitations

Forwardly I lean
step in between
lines upon lines
hidden;
can’t be seen
Falling ill
Now trapped
by its machine
And from my vein;
My blood I spill

A still surface
with sticky sheen
amber tones
from which
I glean
a reason
Thrilled
What it might mean
A hunger
that
can not be filled

Nothing but lies
giving me chills
A shell
with values
not instilled
Instead
it’s dread
Their words
I’m fed
"Nutrients"
to fill my head

My outer skin
Its layer
thin
Not to attacks
No single act
or prayer
could patch
and fill it in
A hole
that’s black
is my first sin

A game
in which
no way to win
and no ending
once it
begins
With opened eyes
commence to see
The dorsal fins
surrounding me

Head starts
to spin
What could have been?
It doesn't matter
in the end
because
there's nothing
here for me
A demon-like reality

Where what you seek
Placed at your feet
The icing; sweet
Choices; not three
Have cake or eat
One choice not two
But want to eat
and have it too

All efforts
to retrieve the treat;
An outcome that
ends in defeat
A princess swept
off of her feat
But this feature
princess;
a creature
Spirit of
a soulless seeker

Deceitful speaker
Flames;
he’ll eat ya
Offers pain
Can’t heal;
life drained
Then reaching out
to use
life-line
but with each ring
hope further wanes

An answered call
done just in time
The chills
running all down my spine
Stand tall
just like Douglas-fir pine
With racing thoughts
filling my mind
I will be saved
Free from it all
God must exist
No time to stall
In battle
warriors
may fall
but no man's ever left behind

Only to find
With said spent dime
A dynamite kind of answer
-
A type
that might
cause strife
Can't plan for
Needed answer
Plight
like cancer
New chance to live
Worldly romancer
On planet Earth
A tiny dancer

A romantic thought
to think
fight fought
Instead a sinking ship
just dropped
This life?
If could
an ‘OUT’
would opt
No more
can take
Just make
it stop
Written: April 17, 2018

All rights reserved.
I thought it right to assess some antidepressants, which philosophers are more inclined to call mood enhancers.
This was during my foray into human enhancement, substances intended to enhance physicality, cognition or mood. Nootropic compounds concern the latter two categories.

The most commonly prescribed mood enhancers are serotonin reuptake inhibitors (SRIs), but it takes over a week for these compounds reach their peak effect.
Thus I approached them with the notion that a limited dosage might point to their character, though  not reveal. These considerations in mind, I set about acquiring a few miscellaneous anti-D's.

Fluoxetine was the first successful selective serotonin re-uptake inhibitor (SSRI), better known by its original brand-name Prozac. Fluoxetine has an acute biological half-life of between 1-3 days. Presence of a trifluoromethyl group on the compound deserves note, I wonder what the presence of electronegative fluorine atoms add to the psychoactive flavor of a compound (subjective effects).
I administered a single dose by mouth, there was some indication of subjective character. Light serotonergic sensations and seemingly benign mood-dampening, there is a ****** towards the positive. Waking headspace relatively uninteresting. Observed hints of oneirogenesis, did not manifest in enough character to be detailed - a sort of vivid, 'pulsive wandering, more pronounced in contrast to its waking character.
Good experiment, interesting results.
Ligand     Ki (nM)   Ki (nM)
Target      Flx            Nflx
SERT        1               19
NET         660           2700
DAT         4180         420
5-HT2A   200           300
5-HT2B    5000         5100
5-HT2C    72.6          91.2
α1             3000         3900
M1            870           1200
M2            2700         4600
M3            1000         760
M4            2900         2600
M5            2700         2200
H1            3250         10000

Sertraline is another popular SSRI, also known by it's original brand-name Zoloft. Sertraline has a variable half-life, on average 26 hours.
It's metabolite, desmethylsertraline, has a half life between 62-104 hours but is a far less potent Serotonin Releasing Agent (SRA).
The presence of two chlorine atoms is interesting. The usual, phenomenal serotonergicity is present and pushing towards the positive.
Some nausea, particularly when hungry (this disappeared after some minestrone soup). Some faintness after physical exertion. This dose did not promote onirogenesis. There was a moment of cognitive distortion when the proportions of a focal object seemed to be growing in-and-out, shifting in size.
Site                 Ki (nM)
SERT              0.15–3.3
NET               420–925
DAT               22–315
5-HT1A       >35,000
5-HT2A          2,207
5-HT2C          2,298
α1A        ­        1900
α1B                 3,500
α1D                 2,500
α2                  477–4,100
D2                  10,700
H1                  24,000
mACh           427–2,100
σ1                   32–57
σ2                   5,297

Escitalopram is an SSRI commonly prescribed for major depression and generalised anxiety. It is the (S)-stereoisomer of citalopram. The biological half-life is of escitalopram is between 27-32 hours.
I administered a dose and thought the phenomenal serotonergicity less apparent than fluoxetine but then gastro-intestinal disturbance was noted, I surmised it has a high affinity for 5-HT2C.
Any oneiric qualities were not readily apparent after a single dose, relatively little visual imagery which is understandable given its lack of affinity for 5-HT2A. I found this to be philosophically interesting. Mood elevation observed in bursts of conversation and as odd sensations, possible mental discomfort.
Ligand,
Recptr     Ki (nM)
SERT       2.5
NET        6,514
5-HT2C   2,531
α1            3,870
M1           1,242
H1           1,973

Venlafaxine is a selective serotonin-norepinephrine reuptake inhibitor (SNRI). Venlafaxine and its metabolites are active for about 11 hours.
Initial subjective effects similar to a very light empathogenic stimulant. Perception of altered attention-span/increased reflexive response; energizing yet paradoxically much yawning.
Ligand,  Vnfx      Dvnfx
Recptr    Ki(nM)  Ki(nM)
SERT  ­    82           40.2
NET       2480        558.4

Tianeptine is a tricyclic antidepressant (TCA) with an unusual mechanism of action. It is an atypical agonist of the μ-opioid receptor and has been described as a (selective) serotonin reuptake enhancer (SRE). It has a short duration as sodium salts [prescribed form] of between 2-4 hours but as sulfate this can be notably extended, some of its metabolites are active for longer than tianeptine itself.
Definitely anxiolytic, quite artificial; possible aphrodisiac. I find its opioid activity dissuading, requires caution.
Site          Ki (nM)
MOR       383–768 (Ki)
                 194 (EC50)
DOR      >10,000 (Ki)
                 37,400 (EC50)
KOR      >10,000 (Ki)
                 100,000 (EC50)
All other transporter/receptor/sub-receptor values are >10,000 (Ki).

Bupropion is a norepinephrine-dopamine reuptake inhibitor (NDRI) with affinity for some nicotinic receptors. Bupropion and its metabolites are active for between 12-36 hours. Interestingly it is a substituted cathinone.
Initial subjective effects similar to a fairly light stimulant. Perception of increased attention-span and improved cognition. It is an onirogen that is neutral in quality, enhancing vivid dreaming (a boon of its nicotinic affinity which is counteracted if the stimulant component impinges on sleep). Completely absent of serotonergicity, curious.
The N-tert-butyl group's effect is most interesting, how it affects metabolism and to what extent ROAs alter pharmacokinetics.
I took 150mg ******, as extended and as instant release (the latter was more pronounced). I thought an altered pharmakinetic profile might result from bypass of hepatic metabolism, so I tried 25mg insufflated and felt as if there was effect that it differed slightly from oral ROAs, but also worried that its metabolic fate is thence unknown (compare to the neurotoxic 3-CMC). What of other bupropiologues,
for example, 3-Methyl-N-tert-butyl-methcathinone? Indeed.
                        Bupropion    R,R-Hydroxybuprpn   Threo-hydrobuprpn
AUC               1                     23.8                                  11.2
Half-life         11 h                 19 h                                 31 h
IC50 (μM)
DAT               0.66                  inactive                          47 (rat)
NET               1.85                   9.9                                  16 (rat)
SERT              inactive          inactive               ­            67 (rat)
α3β4 nic         1.8                   6.5                                   14 (rat)
α4β2 nic         12                     31                                   no data
α1β1γδ nic     7.9                    7.6                                  no data

Moclobemide is a reversible inhibitor of monoamine oxidase A (RIMA), its monoamine oxidase inhibition lasts about 8–10 hours and wears off completely by 24 hours. Inhibiting the decomposition of monoamines (e.g. serotonin, norepinephrine and dopamine) increases their accumulation at an extracellular level. It tends to suppress REM sleep and so it lacks oneirogenic properties.
Feeling of well-being, less constrained by the usual anxieties; openness. Relatively unnoticeable side-effects when diet is carefully managed. Made the mistake of eating a cheese and turkey sandwich (i.e. foodstuff rich in tryptophan/tyramine), indications of serotonergicity later became apparent: feelings of overheating and flushing, slight sweating, racing thoughts and anxious discomfort. A stark reminder of Shulgin's old adage: "there is no casual experiment".
Combination with a select few tryptamines (not 5-MeO-xxT) should be safe, and synergistic (perfect for pharmahuasca); reputed to potentiate GHB. However, generally it is extremely dangerous to combine with serotonergic drugs.
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
zebra Oct 2017
Here is a primer on the history of poetry

Features of Modernism

To varying extents, writing of the Modernist period exhibits these features:

1. experimentation

belief that previous writing was stereotyped and inadequate
ceaseless technical innovation, sometimes for its own sake
originality: deviation from the norm, or from usual reader expectations
ruthless rejection of the past, even iconoclasm

2. anti-realism

sacralisation of art, which must represent itself, not something beyond preference for allusion (often private) rather than description
world seen through the artist's inner feelings and mental states
themes and vantage points chosen to question the conventional view
use of myth and unconscious forces rather than motivations of conventional plot

3. individualism

promotion of the artist's viewpoint, at the expense of the communal
cultivation of an individual consciousness, which alone is the final arbiter
estrangement from religion, nature, science, economy or social mechanisms
maintenance of a wary intellectual independence
artists and not society should judge the arts: extreme self-consciousness
search for the primary image, devoid of comment: stream of consciousness
exclusiveness, an aristocracy of the avant-garde

4. intellectualism

writing more cerebral than emotional
work is tentative, analytical and fragmentary, more posing questions more than answering them
cool observation: viewpoints and characters detached and depersonalized
open-ended work, not finished, nor aiming at formal perfection
involuted: the subject is often act of writing itself and not the ostensible referent

............
Expressionism

Expressionism was a phase of twentieth-century writing that rejected naturalism and romanticism to express important inner truths. The style was generally declamatory or even apocalyptic, endeavoring to awaken the fears and aspirations that belong to all men, and which European civilization had rendered effete or inauthentic. The movement drew on Rimbaud and Nietzsche, and was best represented by German poetry of the 1910-20 period. Benn, Becher, Heym, Lasker-Schüler, Stadler, Stramm, Schnack and Werfel are its characteristic proponents, {1} though Trakl is the best known to English readers. {2} {3}

Like most movements, there was little of a manifesto, or consensus of beliefs and programmes. Many German poets were distrustful of contemporary society — particularly its commercial and capitalist attitudes — though others again saw technology as the escape from a perceived "crisis in the old order". Expressionism was very heterogeneous, touching base with Imagism, Vorticism, Futurism, Dadaism and early Surrealism, many of which crop up in English, French, Russian and Italian poetry of the period. Political attitudes tended to the revolutionary, and technique was overtly experimental. Nonetheless, for all the images of death and destruction, sometimes mixed with messianic utopianism, there was also a tone of resignation, a sadness of "the evening lands" as Spengler called them.

Expressionism also applies to painting, and here the characteristics are more illuminating. The label refers to painting that uses visual gestures to transmit emotions and emotionally charged messages. In the expressive work of Michelangelo and El Greco, for example, the content remains of first importance, but content is overshadowed by technique in such later artists as van Gogh, Ensor and Munch. By the mid twentieth-century even this attenuated content had been replaced by abstract painterly qualities — by the sheer scale and dimensions of the work, by colour and shape, by the verve of the brushwork and other effects.

Expressionism often coincided with rapid social change. Germany, after suffering the horrors of the First World War, and ineffectual governments afterwards, fragmented into violently opposed political movements, each with their antagonistic coteries and milieu. The painting of these groups was very variable, but often showed a mixture of aggression and naivety. Understandably unpopular with the establishment  — denounced as degenerate by the Nazis — the style also met with mixed reactions from the picture-buying public. It seemed to question what the middle classes stood for: convention, decency, professional expertise. A great sobbing child had been let loose in the artist's studio, and the results seemed elementally challenging. Perhaps German painting was returning to its Nordic roots, to small communities, apocalyptic visions, monotone starkness and anguished introspection.

What could poetry achieve in its turn? Could it use some equivalent to visual gestures, i.e. concentrate on aspects of the craft of poetry, and to the exclusion of content? Poetry can never be wholly abstract, a pure poetry bereft of content. But clearly there would be a rejection of naturalism. To represent anything faithfully requires considerable skill, and such skill was what the Expressionists were determined to avoid. That would call on traditions that were not Nordic, and that were not sufficiently opposed to bourgeois values for the writer's individuality to escape subversion. Raw power had to tap something deeper and more universal.

Hence the turn inward to private torments. Poets became the judges of poetry, since only they knew the value of originating emotions. Intensity was essential.  Artists had to believe passionately in their responses, and find ways of purifying and deepening those responses — through working practices, lifestyles, and philosophies. Freud was becoming popular, and his investigations into dreams, hallucinations and paranoia offered a rich field of exploration. Artists would have to glory in their isolation, moreover, and turn their anger and frustration at being overlooked into a belief in their own genius. Finally, there would be a need to pull down and start afresh, even though that contributed to a gradual breakdown in the social fabric and the apocalypse of the Second World War.

Expressionism is still with us. Commerce has invaded bohemia, and created an elaborate body of theory to justify, support and overtake what might otherwise appear infantile and irrational. And if traditional art cannot be pure emotional expression, then a new art would have to be forged. Such poetry would not be an intoxication of life (Nietzsche's phrase) and still less its sanctification.  Great strains on the creative process were inevitable, moreover, as they were in Georg Trakl's case, who committed suicide shortly after writing the haunting and beautiful piece given below

................
SYMBOLIST POETS
symbolism in poetry

Symbolism in literature was a complex movement that deliberately extended the evocative power of words to express the feelings, sensations and states of mind that lie beyond everyday awareness. The open-ended symbols created by Charles Baudelaire (1821-67) brought the invisible into being through the visible, and linked the invisible through other sensory perceptions, notably smell and sound. Stéphane Mallarmé (1842-98), the high priest of the French movement, theorized that symbols were of two types. One was created by the projection of inner feelings onto the world outside. The other existed as nascent words that slowly permeated the consciousness and expressed a state of mind initially unknown to their originator.

None of this came about without cultivation, and indeed dedication. Poets focused on the inner life. They explored strange cults and countries. They wrote in allusive, enigmatic, musical and ambiguous styles. Rimbaud deranged his senses and declared "Je est un autre". Von Hofmannstahl created his own language. Valéry retired from the world as a private secretary, before returning to a mastery of traditional French verse. Rilke renounced wife and human society to be attentive to the message when it came.

Not all were great theoreticians or technicians, but the two interests tended to go together, in Mallarmé most of all. He painstakingly developed his art of suggestion, what he called his "fictions". Rare words were introduced, syntactical intricacies, private associations and baffling images. Metonymy replaced metaphor as symbol, and was in turn replaced by single words which opened in imagination to multiple levels of signification. Time was suspended, and the usual supports of plot and narrative removed. Even the implied poet faded away, and there were then only objects, enigmatically introduced but somehow made right and necessary by verse skill. Music indeed was the condition to which poetry aspired, and Verlaine, Jimenez and Valéry were among many who concentrated efforts to that end.

So appeared a dichotomy between the inner and outer lives. In actuality, poets led humdrum existences, but what they described was rich and often illicit: the festering beauties of courtesans and dance-hall entertainers; far away countries and their native peoples; a world-weariness that came with drugs, isolation, alcohol and bought ***. Much was mixed up in this movement — decadence, aestheticism, romanticism, and the occult — but its isms had a rational purpose, which is still pertinent. In what way are these poets different from our own sixties generation? Or from the young today: clubbing, experimenting with relationships and drugs, backpacking to distant parts? And was the mixing of sensory perceptions so very novel or irrational? Synaesthesia was used by the Greek poets, and indeed has a properly documented basis in brain physiology.

What of the intellectual bases, which are not commonly presented as matters that should engage the contemporary mind, still less the writing poet? Symbolism was built on nebulous and somewhat dubious notions: it inspired beautiful and historically important work: it is now dead: that might be the blunt summary. But Symbolist poetry was not empty of content, indeed expressed matters of great interest to continental philosophers, then and now. The contents of consciousness were the concern of Edmund Husserl (1859-1938), and he developed a terminology later employed by Heidegger (1889-1976), the Existentialists and hermeneutics. Current theories on metaphor and brain functioning extend these concepts, and offer a rapprochement between impersonal science and irrational literary theory.

So why has the Symbolism legacy dwindled into its current narrow concepts? Denied influence in the everyday world, poets turned inward, to private thoughts, associations and the unconscious. Like good Marxist intellectuals they policed the area they arrogated to themselves, and sought to correct and purify the language that would evoke its powers. Syntax was rearranged by Mallarmé. Rhythm, rhyme and stanza patterning were loosened or rejected. Words were purged of past associations (Modernism), of non-visual associations (Imagism), of histories of usage (Futurism), of social restraint (Dadaism) and of practical purpose (Surrealism). By a sort of belated Romanticism, poetry was returned to the exploration of the inner lands of the irrational. Even Postmodernism, with its bric-a-brac of received media images and current vulgarisms, ensures that gaps are left for the emerging unconscious to engage our interest

......................

.
IMAGIST POETRY
imagist poetry

Even by twentieth-century standards, Imagism was soon over. In 1912 Ezra Pound published the Complete Poetical Works of its founder, T.E. Hulme (five short poems) and by 1917 the movement, then overseen by Amy Lowell, had run its course. {1} {2} {3} {4} {5} The output in all amounted to a few score poems, and none of these captured the public's heart. Why the importance?

First there are the personalities involved — notably Ezra Pound, James Joyce, William Carlos Williams {6} {7} {8} {9} — who became famous later. If ever the (continuing) importance to poets of networking, of being involved in movements from their inception, is attested, it is in these early days of post-Victorian revolt.

Then there are the manifestos of the movement, which became the cornerstones of Modernism, responsible for a much taught in universities until recently, and for the difficulties poets still find themselves in. The Imagists stressed clarity, exactness and concreteness of detail. Their aims, briefly set out, were that:

1. Content should be presented directly, through specific images where possible.
2. Every word should be functional, with nothing included that was not essential to the effect intended.
3. Rhythm should be composed by the musical phrase rather than the metronome.

Also understood — if not spelled out, or perhaps fully recognized at the time — was the hope that poems could intensify a sense of objective reality through the immediacy of images.

Imagism itself gave rise to fairly negligible lines like:

You crash over the trees,
You crack the live branch…  (Storm by H.D.)

Nonetheless, the reliance on images provided poets with these types of freedom:

1. Poems could dispense with classical rhetoric, emotion being generated much more directly through what Eliot called an objective correlate: "The only way of expressing emotion in the form of art is by finding an 'objective correlative'; in other words, a set of objects, a situation, a chain of events which shall be the formula of that particular emotion; such that when the external facts, which must terminate in sensory experience, are given, the emotion is immediately evoked." {10}

2. By being shorn of context or supporting argument, images could appear with fresh interest and power.

3. Thoughts could be treated as images, i.e. as non-discursive elements that added emotional colouring without issues of truth or relevance intruding too mu
...............
PROSE BASED POETRY
prose based poetry

When free verse lacks rhythmic patterning, appearing as a lineated prose stripped of unnecessary ornament and rhetoric, it becomes the staple of much contemporary work. The focus is on what the words are being used to say, and their authenticity. The language is not heightened, and the poem differs from prose only by being more self-aware, innovative and/or cogent in its exposition.

Nonetheless, what looks normal at first becomes challenging on closer reading — thwarting expectations, and turning back on itself to make us think more deeply about the seemingly innocuous words used. And from there we are compelled to look at the world with sharper eyes, unprotected by commonplace phrases or easy assumptions. Often an awkward and fighting poetry, therefore, not indulging in ceremony or outmoded traditions.
What is Prose?

If we say that contemporary free verse is often built from what was once regarded as mere prose, then we shall have to distinguish prose from poetry, which is not so easy now. Prose was once the lesser vehicle, the medium of everyday thought and conversation, what we used to express facts, opinions, humour, arguments, feelings and the like. And while the better writers developed individual styles, and styles varied according to their purpose and social occasion, prose of some sort could be written by anyone. Beauty was not a requirement, and prose articles could be rephrased without great loss in meaning or effectiveness.

Poetry, though, had grander aims. William Lyon Phelps on Thomas Hardy's work: {1}

"The greatest poetry always transports us, and although I read and reread the Wessex poet with never-lagging attention — I find even the drawings in "Wessex Poems" so fascinating that I wish he had illustrated all his books — I am always conscious of the time and the place. I never get the unmistakable spinal chill. He has too thorough a command of his thoughts; they never possess him, and they never soar away with him. Prose may be controlled, but poetry is a possession. Mr. Hardy is too keenly aware of what he is about. In spite of the fact that he has written verse all his life, he seldom writes unwrinkled song. He is, in the last analysis, a master of prose who has learned the technique of verse, and who now chooses to express his thoughts and his observations in rime and rhythm."

.............
OPEN FORMS IN POETRY
open forms in poetry

Poets who write in open forms usually insist on the form growing out of the writing process, i.e. the poems follow what the words and phrase suggest during the composition
470

I am alive—I guess—
The Branches on my Hand
Are full of Morning Glory—
And at my finger’s end—

The Carmine—tingles warm—
And if I hold a Glass
Across my Mouth—it blurs it—
Physician’s—proof of Breath—

I am alive—because
I am not in a Room—
The Parlor—Commonly—it is—
So Visitors may come—

And lean—and view it sidewise—
And add “How cold—it grew”—
And “Was it conscious—when it stepped
In Immortality?”

I am alive—because
I do not own a House—
Entitled to myself—precise—
And fitting no one else—

And marked my Girlhood’s name—
So Visitors may know
Which Door is mine—and not
Ken Pepiton Dec 2018
Clarifying failed. Spelchek is not on strike.

{clear ification, an ionic bond be tween me and thee,
alienated mind, not mined, crafted
from tactics and strategies
beyond chess.
Player One,
1980's era
jewish-geek-mid-pubesence-kid-level,
proceed with caution.
This trope has trapped many a curious child.
---
Now, enter the old ones,
Grandfather taught uncle chess so well
he went to the state tournament in Kayenta,
and a grandma was
state-champ-bare-bow-in-the-rain-shooter,

these, now must learn

minecraft on x-box to be considered
for the real life role of

good at games grand parents
from the time right after atom bombs kicked up dust
places dust had not been in a very long time and
as the dust began to settle

some dust mights was cationic.
Negative bits, they became embedded in the code.
Bumps, fering, coming together
just a knot in a string,
attracting anionic curiosity might

round and round phorward ferring to be
a thread to tie my heart to yours

like twisted Pima cotton thread,
that I pulled from an old sweatshirt
to tie a crow feather in this paho of words filled with old jokes

Making this clear would belie the entire story AI and I know true}

truth is. we agree. no capsokehspaceasneededcommasetal.
caps okeh space as needed commas et al
go.
Did that work? That line

subject of this act fact done, agree to follow,
and I may lead and be

not you, me, dear reader, I mean first true

there is no any if nothing is. So simple some say its sublime beyond the spectrum of ones
and zeros thought on off probably

either or any time time can be accounted for

wouldn't you take a

thought,  nothing,
as it is commonly said to be understandable,

the state of not being, imagine that

the state of not being we negate in being,
unless you are mad and are lost in a whirlwind
such as such voices have been said to

have twisted into threads as
wicks for our lamps
turn floating on
golden oil twisting
wickered into wickering wee shadow fibers
on the western wall for legends to sprout from.

Wickering mare over there, expands us both by my hearing her
you had no idea she was near enough to hear
time is no barrier in actual ever.
What phor can contain me,
whispered my whimsy

Imagine she spoke,
what would she say for what reason
would she say

good good good, I feel good, ha,
I am right, by accident. ever body can feel this good.

good is good.
good is.
Sam Harris, agrees, good as far as good goes, is good
in every vecter from now

the terrain does exist, beyond the moral landscape, to

true true
trust me, I been there.
Been there done that was inserted into the vernacular on my watch,
first summer post war.

matter must not matter as much to me as it does to thee, nestypass? no se?

All jewish boys have chess move metaphors.
(a phor is for containing,
bearing
meta,
everybody knows, like metaphysics,
after physics in the stack of stackable metadata)

OHMYGOD THE IDW circa 2018 -- who knew I ate this **** up?

[the old code calls for excretion of digested material
from which meaning has been extracted in the idleword accounting processor:
literal
<pre>what if utterance=****, then **** haps, no else then</pre>]

Did that happen? One of my friends told me that happened in Florida, the whole world turned to ****... for lack of a nail a kingdom was lost, they say, little foxes spoil the grapes,
hung chad ex
cuses...

Pre-expandable ROM, not magic. tech,

pre-infinite imagination? impossible.
and nothing is what is impossible with good as god.

Is there no perfect game?
is the game the session or the life of the user
offline

rerererererererererereroxotoxin, poison pen
ideal viral umph exspelliered
up against the wall

reset. We

kunoon albania omerta oy vey, who could say?
one way better, one way not? quark.
up or down, with variable spins, who can say?

Life's right,
yes. but mo'ons of other something must have been for higgs to ever matter

and it does, I got commas, from 2018.

Are you with me? This is that book I told you I had access…

You or some mind other than mine owned mind, where
my owned peace rests in truth,

otherwise, I know every any or else in the code since I can recall,
in time

if this were a test I swore to take to prove to you
the we can be me in your head

phillipkdicktated clue

if you don't know me by now, maybe we should stop.

Temptations are times. Time things. Time spans, yeah, like bridges

or portals, right
The Internet in One Day, Fred Pryor Resources,
Wu'wuchim 1995.

Ever, not everish or everistic or every, but ever
body knows,
but you.

Catch up. We left all our doors blown off, once we learned that we could blow our own doors off,

there are no open sesames or slips of leth or sibylets

shiba yah you knew all along there was a
song she sang all one and we watched it morph
before our very eyes

alone.

The magic stories words may contain, may bear, we must agree

more than we may know, by faith, metagnostic as we see

the sublime gift of the magi
become clear und

be und sein sind both trueture same tu you, we agree.
But. Lock here, no pre 2018 editing codes

validate past last go.
Do one good thing today. That was my goal. Today https://anchor.fm/ken-pepiton Part 3 Soyal Hopi Mystery Enactment (called mystery plays). And the intro to Moral Landscape by Sam Harris, led me let ******* write a poem.
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Diversity of motivation among self-harming individuals

An estimated one in twelve teenagers has committed self-harm. Of those many will continue self-injuring into young adult hood. Yet older adults are not immune to committing this act. In 2003-2004 adults age 25-44 were responsible for nearly fifty percent of reported/discovered self-harm cases.  There are many reasons that people self-harm. These reasons may include self-harming as a survival mechanism, self-harm as an outer expression of inner emotional turmoil, and self-harm as a means to exercise control over one’s environment.
Contrary to popular thought, only one in ten people who make the decision to self-harm are suicidal. The majority of people who cause injury to themselves willfully have a wish to avoid killing themselves. The act of self-harm is developed as a “technique” to cope and survive the afflictions of life. How can we know that this is the reasoning or thought behind the action of self-harm? “Cutters” typically reason out the least amount of damage that will “remedy” the stress intensive situation that they find themselves in, and exercise an enormous amount of restraint in inflicting only a measured amount of damage. Cutters’ common logic is that through this expression of injury, further damage to their selves may be headed off. --------, a former cutter, attests to the reality of this when he says, “Every time that I touched a blade to my skin, I would resist making a larger cut, a deeper wound. Every time that I hurt myself, I did so only in response to what drove me over the edge; Each time the amount of physical damage that I did was the very least that I could muster. I fought to do the least damage I could, no matter how intense the pain that I felt became.” He sums it up rather nicely.
Secondly, self-harm is used as an outward expression of deeper, more complex emotional and psychological phenomena. It is not a diagnosis; it is a symptom. It is a symptom of a struggle that is inherited by victims of abuse, those who lose a loved one, or experience other traumatic events during their childhood. These groups are far more likely to indulge in self-harm. One study conducted by Boudewyn and Liem found that of those college students that reported a history of self-harm, fifty two percent had been sexually abused as a child. Those that self-harm do not simply cut to cut, burn to burn, or mutilate to mutilate. There is a deeper motivation. This motivation is commonly emotional. These motivational emotions are often the results of tragic or traumatic life experiences. It is seldom that a cutter’s motivation is a want for attention.  In fact, most cutters are chameleons.
Self- harm is used as a tool to exercise control in a chaotic environment over which one would not otherwise have any means to control. Among chaos and turmoil such as the loss of a parent or close friend, relational betrayal, divorce of one’s parents, or consistent, one time, or sporadic physical, emotional, or ****** abuse an individual is radically more likely to engage in self-harm. Outside reasoning on this is only speculative. For this reason it is valuable to look at the action from the perspective of those who commit it. Cody, the same individual mentioned earlier says something else that lines up with this common scholarly opinion. He says “I remember the very first time I cut myself intentionally. I was in the ninth grade, in the school bathroom. I had just experienced what I saw as betrayal by my best friend of about ten years. I felt like I lost him. I felt like things were spinning out of control, and I couldn’t control the way I felt about it all. The only way I could feel that control was with something sharp in my hand.” This is characteristic not only of ----- but also of many other cutters.
Cutters are not (necessarily) crazy. On the surface it may appear that cutting goes against the ingrained survival and self-preservation instincts in human beings. This is actually the opposite of the truth. Many who cut feel that if they don’t inflict smaller harm to themselves that they may indeed fall to suicide. They feel that by letting out their pain in increments, and escaping in fragments, that they can slay the thoughts of suicide and urges to escape that they carry. When at the edges of rational, some instincts may take different forms. What may seem counter intuitive – an act of self-harm – becomes the definition of an instinct that it seems to defy. The desire to survive becomes so strong that it is necessary to inflict pain. This is not uncommon to survival situations. For example, the movie 127 Hours reenacts the experience of a man trapped under a boulder in a beautiful and secluded gorge. He cut off his own arm with a dull multi-tool in order to escape death. That act is the epitome of self-harm as a survival instinct.
Cutting could lead to a series of events that tailspin out of control. Loss of control could take the form of the spiral of therapies and prescriptions that would follow if it were discovered that one were cutting , or it could be the accidental slip of a blade gone too far. It could end in hospitalization. It could even end in death. However, those individuals who choose to cut, as long as sober, take precautions to avoid discovery or more injury than is intended. They are meticulous, careful even. They reason out how, where, and when they can cut “safely”. They are very much in control over the act, when they feel they cannot be in control of anything else.
It may rationally appear that pain is pain. That it would make no difference whether out or inward, because whatever its state, the pain is still owned by the individual. However, emotions are often harder to process than physical events. A burning rage, hate or guilt may well be harder to cope with than a burn to one’s arm, leg, or hand. An emotional cut to the bone may be less painful than a physical one. It may be said that the act does not transform the pain, but multiplies it. This in essence may be true, but one form of pain allows a man to ignore another. A pinch may allow a man to ignore the emotional pain of a nightmare. A small cut may allow ignorance of the bigger cut on one’s spirit or psyche.
There are widely varying and increasingly complex variations of motivation and cause of self-harm. They may include, but are absolutely and in no way limited to: self-harm as a coping or survival mechanism, self-harm as a tool to exercise control over one’s increasingly chaotic environment, and self-harm as an outer expression of inner emotional turmoil. To believe that cutting is simple is to nearly deny it altogether. Its essence is complicated. Stereotyping self-harm or self-harmers may well lead to opinions that will ostracize or further encourage the occurrence of self-harm.  Since the motivation and causes of self-harm are undeniably complex, to attempt to brush this under a rock would be to diminish its importance, and to deny healing to those who need to understand it.
Establish a research and development facility tasked with recycling 100,000 commonly used household goods or packaged products back into the original base material needed to remake it into new product packaging. Pass legislation requiring all companies selling products with packaging to buy their source materials from a registered public-private venture allowing any firm willing to participate to do so. Companies must then manufacture packaging locally using source materials supplied by one of the public-private companies. Companies will also be required to hire locally using a diversity and economic income model incorporating or locating the participating companies in the poorest rural counties in the state.










Society grows great when Old Men plant trees.  -Socrates
sammyblory Nov 2014
Events Marketing
Inform your followers on the latest update of your business. Whenever there are business engagements, such as trade show or conventions, business owners can notify their followers by uploading images on Instagram. Taking pictures and tagging subscribers in the specific location can boost visits and sales. It is important to be creative in taking pictures. Photogene and ColorSplash are the two most commonly used editing application in Instagram. In event marketing, VIP discounts can be offered to subscribers.

Contests
People are looking for excitement and rewards. Holding a contest as an activity is an exciting engagement to attract audience.

Geotagging
Instagram users can use the feature of geotagging in order to tag a specific location as to where the images were shot. For business, customers can be more familiar with the location of the business with the geotagging feature.

Remember that today, the most successful people are known to take advantage of the social media.

— The End —