Matthew found before the first Gospel is unfortunately somewhat damaged. Spiritual contemplation, offering a glimpse into heaven. Their mesmeric power was intended to induce intense It should be noted that these artefacts were not purelyįunctional. Rich colours and glittering surfaces normally associated with the sisterĪrts of icon painting and mosaics. Our manuscript eloquently demonstrates the Byzantine love of Lowden, these mostly conform to a standard pattern, containing decoratedĬanon Tables, with images and decorative headpieces prefacing the start ofĮach of the four Gospels. In particular, large numbers of Gospel books were made. The vast majority of Byzantine illuminations are found in religious Itself was a major centre for manuscript production at this time, manyīooks - such as this one - have also been identified as emanating from monasteries Our manuscript is a product of the period of the Comnenan dynasty ofĮmperors (1081-1204), a time of thriving artistic and intellectual life. The mainīulk of this material is post-Iconoclast. Thousands of Byzantine manuscripts have survived to this day. Masterpieces, which were regarded with awe by the rest of Europe'. Middle Byzantine period that followed (from the late Ninth through to the TwelfthĬentury) consequently 'saw the creation of some of its greatest Ideas and resurgence in creative thinking. They were thus exposed to new iconography, styles and techniques. Ironically, Iconoclasm had breathed new life into Byzantine art:īecause of it, artists had no native tradition to draw on, and many settled outwith But following its rejection inĨ43, a glorious revival ensued. This banned idolatry and the use of religious images, withĬatastrophic consequences for the arts. Sophia, the Church of Holy Wisdom, in Constantinople, a building famedĬentury, however, theological controversy led to a movement called The first 'golden age' for Byzantine arts was in Highly civilized, the Byzantines developed a culture and religionĭistinct from the West. Its period of existence thusĮncompassed late Antiquity, the Middle Ages and the Renaissance. This vast empire enjoyedĪ long but turbulent history until, territorially much diminished, itįinally fell to the Ottoman Turks in 1453. The capital of the Eastern Roman Empire in 324. It is a superb example of provincial Byzantine art.ĭetail of illuminated miniature depicting St MarkĬonstantine the Great chose Byzantium (renaming it Constantinople) as Prefaced by a full page author portrait, lavishly coloured with rich Probably produced in southern Italy or Sicily, this manuscript datesįrom the mid to late Twelfth Century. To mark Easter, a beautifully illuminated ByzantineĬopy of the Greek Gospels features as our book choice this April. Southern Italy/Sicily: mid-late 12th Century SPECIAL COLLECTIONS DEPARTMENT Book of the Month Please note that these pages are from our old (pre-2010) website the presentation of these pages may now appear outdated and may not always comply with current accessibility guidelines.
0 Comments
We really appreciated being able to install fonts temporarily, not to mention the option to remove all temporary fonts at once.ĪMP Font Viewer is excellent for getting an overview of your fonts as well as adding new fonts and removing unnecessary ones. The Not Installed fonts tab has a complete tree view for quickly finding and installing new fonts. Font Viewer displays information about each font, including its type and any available subfamilies. A scrolling fonts menu next to a preview pane displays each font in two sentences containing each letter of the English language alphabet, as well as buttons for Bold, Italic, Underline, Size, Color, and ANSI characters. A file menu accesses all functions: Edit, Format, View, Options, and so on. The main view has separate tabs for managing installed and not-installed fonts. The ReadMe file serves as Font Viewer's Help file, with installation and usage tips, recommendations for users of various Windows versions, and a list of known issues related to certain font types.Īll our fonts were displayed in a browserlike screen overlaid by a window, the Interchange Window, which resembles an enhanced Save File dialog box. We tried Font Viewer in 64-bit Windows 7 Home Premium SP1.įont Viewer is light and fast, and it opened almost the instant we clicked its desktop shortcut. Regular updates are logged on the program's Web site. This lightweight freeware is compatible with nearly every version of Windows still in use, even 9x releases from the 1990s. Font Viewer can install and uninstall fonts, sample them, and organize them into categories. That's where tools like AMPsoft's AMP Font Viewer come in. Windows is so full of fonts that they'd fill a warehouse if they were cast-metal typesets, but it doesn't go out of its way to make them easy to manage. Adobe FreeHand (formerly Macromedia Freehand and Aldus Freehand) is mainly used by professional graphic designers.Flash uses Actionscript for OOP, and has full XML functionality through E4X support. The most important of these tools are vector lines and fills with bitmap-like selectable areas, simple modification of curves via the "selection" or the control points/handles through "direct selection" tools. Adobe Flash (formerly a Macromedia product) has straightforward vector editing tools that make it easier for designers and illustrators to use.On May 6, 2013, Adobe announced that Fireworks would be phased out. Some support for exporting to SVG is available via a free Export extension. Fireworks can also open FWPNG/PNG, PSD, AI, EPS, JPG, GIF, BMP, TIFF file formats, and save/export to FWPNG/PNG, PSD, AI (v.8), FXG (v.2.0), JPG, GIF, PDF, SWF and some others. Fireworks can manage the PSD and AI file formats which enables it to be integrated with other Adobe apps. The Fireworks editable PNG file format is not supported by other Adobe products. It is easier to learn than other products and can produce complex vector artwork. Adobe Fireworks has a competitive price, but its features can seem limited in comparison with other products. The native Fireworks file format is editable PNG (FWPNG or PNG). This means it is mostly used for screen design. Fireworks supports RGB color scheme and has no CMYK support. Adobe Fireworks (formerly Macromedia Fireworks) is a vector editor with bitmap editing capabilities with its main purpose being the creation of graphics for Web and screen.This article is neither all-inclusive nor necessarily up-to-date. See the article on each editor for further information. The tables in this article compare general and technical information for a number of vector graphics editors. Another important factor is the application's support of various vector and bitmap image formats for import and export. Some programs are more suitable for artistic work while others are better for technical drawings. Potential users of these editors will make a comparison of vector graphics editors based on factors such as the availability for the user's platform, the software license, the feature set, the merits of the user interface (UI) and the focus of the program. ( Learn how and when to remove this template message)Ī number of vector graphics editors exist for various platforms. JSTOR ( September 2020) ( Learn how and when to remove this template message).Unsourced material may be challenged and removed.įind sources: "Comparison of vector graphics editors" – news Please help improve this article by adding citations to reliable sources. This article needs additional citations for verification. Taking oleander leaf, oleander leaf tea, or oleander seeds has led to deadly poisonings. It can cause nausea, vomiting, diarrhea, weakness, headache, stomach pain, serious heart problems, and many other side effects. … She seems particularly attracted to very soft, green, large leaves, like those on an oleander, azalea, sago palms and English ivy plants – all of which are toxic to dogs. The problem was, unbeknownst to us, lots of the plants in our new yard were poisonous for dogs some could even kill horses and humans. Dogs, cats, goats, cattle, sheep, camelids, budgerigaries, rabbits and horses are all species that have been affected by oleander. Nerium oleander is a popular ornamental garden plant due to its beauty and tolerance of poor soil and drought, but unfortunately it’s very toxic to many species of animals. Gardeners living outside the shrub’s Southern “comfort zone” can grow Nerium oleander in containers and bring them indoors during the winter. … All parts of oleander - leaves, flowers, stems, twigs, roots - are toxic. Is it safe to plant oleander?Īll parts of oleander - leaves, flowers, stems, twigs, roots - are toxic. … Oleander is also extremely toxic to cats, dogs and horses. If you are cultivating an oleander, wear gloves when you prune the shrub, and wash your hands well afterward. Simply touching an oleander plant can cause skin irritation, particularly if you come into contact with the plant sap. The oleander, also known as laurel of flower or trinitaria, is a shrub plant (of Mediterranean origin and therefore, resistant to droughts) with intensely green leaves and whose leaves, flowers, stems, branches and seeds are all highly poisonous, hence it is also known as “the most poisonous plant in the world”. What is the most poisonous plant in the world? Gilgil, KenyaThe deadliest flower in the insect world is soft to the touch. This flower, the pyrethrum plant, contains a potent chemical that is made into an effective, and environmentally friendly, insecticide. The yellow center of the ‘ killer chrysanthemum‘ contains a natural toxin that is a powerful insecticide. What is the deadliest flower in the world? Oleander is so toxic, humans don’t even have to ingest it to experience symptoms of poisoning - just touching the plant and tree sap with bare hands or inhaling the smoke of burning oleander can induce toxic effects. Osterloh and associates calculated the lethal oleander leaf dose of their patient to be approximately 4 gm. It is interesting that oleander poisoning can be fatal with relatively small amounts ingested. Which is the oldest flower of the world?.What plant can kill you if you touch it?.What is the most poisonous plant in the world?.What is the deadliest flower in the world?. The results reveal the value of considering climate variability for flood frequency analysis, especially when non-stationarity is established by homogeneity analysis. The influence of climate variability on flood estimates in the region was linked to the Madden-Julian Oscillation (MJO) climate indices and resulted in increased flood magnitude for regional and direct flood frequency estimates varying from 0% - 35% and demonstrate that multi-decadal changes in atmospheric conditions influence both small and large floods. The Generalized Logistic distribution was fitted to the annual maximum flood series for the 2 homogeneous regions to estimate flood magnitudes and the probability of occurrence while accounting for climate variability. Data from 17 gauging stations within the Ogun-Osun River Basin in Western Nigeria were analysed, resulting in the delineation of 3 sub-regions, of which 2 were homogeneous and 1 heterogeneous. It is written in C++, and offers a number of features outline on the webpage. This study applies regional Flood Frequency Analysis (FFA) to curtail deficiencies in historical data, by agglomerating data from various sites with similar hydro-geomorphological characteristics and is governed by a similar probability distribution, differing only by an “index-flood” as well as accounting for climate variability effect. Engauge Digitizer is an open source digitizing proram available under the terms of the GNU GPL. Such data are seldom available in many developing regions, owing to financial, technical, and organizational drawbacks that result in short-length and inadequate historical data that are prone to uncertainties if directly applied for flood frequency estimation. To mitigate and minimize the impact of such floods now and in the future, effective planning is required, underpinned by analytics based on reliable data and information. DigitizeIt makes it easy to actually get back numbers from such a plot This is a three step process: import the graph from a file or copy it over the clipboard, define the axes system. in most scientific publications only plots but no data values are published. Sometimes it is necessary to extract data values from graphs, e.g. Nigeria, the case-study for this research experiences recurrent flooding, with the most disastrous being the 2012 flood event that resulted in unprecedented damage to infrastructure, displacement of people, socio-economic disruption, and loss of lives. DigitizeIt digitizer software replaces a digitizer tablet. reverse engineers data from a scanned plot, so you can incorporate published data in. Journal of Water Resource and Protection,ĪBSTRACT: Extreme flood events are becoming more frequent and intense in recent times, owing to climate change and other anthropogenic factors. Engauge digitizer polar software Engauge digitizer polar trial. Accounting for the Effects of Climate Variability in Regional Flood Frequency Estimates in Western NigeriaĪUTHORS: Iguniwari Thomas Ekeu-Wei, George Alan Blackburn, Jason GiovannettoneĬlimate Variability, Regional Flood Frequency, Climate-Indices, L-Moment, Madden-Julian Oscillation (MJO), Generalised Logistic (GLO), Climate-Indices Among them were the most preeminent demon slayer and the strongest sorcerer in history, along with their subordinates and colleagues fighting at their side. However, there existed many heroes who were brave enough to oppose these demons. Upon inspection, the Sohayamaru once again shines brilliantly and the protagonist is whisked away to the middle of the Heian Period, landing in an ancient version of the capital.Ĭontrary to its name “Heian Palace,” which means peace and tranquility, ancient Kyoto was terrorized by countless Yokai during this time period. In order to unravel the mysteries surrounding the history of the Sohayamaru, our protagonist ventures to Kyoto City and discovers a shrine furnished with an old worn-out box. So, let me throw out some clues and story details to give you a taste of what’s on the horizon for this next installment. Now I’d hate to leave you guys completely in the dark on this upcoming DLC expansion. And to top it all off, this new chapter will present electrifying new armor sets and a weapon that fans of hand-to-hand combat will surely relish. Here are the first details of the upcoming DLC, via the PlayStation Blog:ĭarkness in the Capital features new storylines, overwhelmingly powerful new bosses, tricky new Yokai, new Guardian Spirits, skills, Ninjutsu, Onmyo Magic and Soul Cores. There’s no word if the game will be out for PC, just like its predecessor. Nioh 2 is available now for PlayStation 4. Team Ninja and KOEI Tecmo announced today that Nioh 2 will be getting its second major DLC, Darkness in the Capital, on October 15 for the PlayStation 4. You can also mount the /var/www/webtrees/modules_v4/ directory. If you have any problems or questions, help is available on the webtrees forum. If you want to add custom themes or modules, If you want to use a PostreSQL database, set the following values:Īll other values are just like a MySQL database. If you want to use a SQLite database, set the following values: This image does not support Microsoft SQL Server, in order PostgreSQL and SQLite are additionally both supported by webtrees and this image, butĪre not recommended. You will need a separate container for this. The database ( DB_) and webtrees ( WT_) variables blank, and you can complete theĪ MySQL (or compatible equivalent) database. (if you're migrating from an existing webtrees installation for example), simply leave If you don't want the container to be configured automatically Spaghetti Detective Ubooquity UnifiController Watchtower WebTrees Zammad Money. Note, this is only used the first time the container is run, and the database is initialized.Īdditionally, you can add _FILE to the end of any environment variable name,Īnd instead that will read the value in from the given filename.įor example, setting DB_PASS_FILE=/run/secrets/my_db_secret will read the contents webtrees is a free open source web-based genealogy application intended for collaborative use. Ask in the Cloudron Forum - Searx Searx Website Searx issue tracker. Note, this is only used the first time the container is run, and the database is initialized.įirst admin account email. Note, this is only used the first time the container is run, and the database is initialized.įirst admin account password. Note, this is only used the first time the container is run, and the database is initialized.įirst admin account full name. Hi everyone,sorry for my english i've problem to install Geonames into Webtrees 2.03 (software for genalogy). Set this to a value of "" to have no table prefix.įirst admin account username. Prefix to give all tables in the database. See below for valid values.ĭB_PASS or MYSQL_PASSWORD or MARIADB_PASSWORDĭB_NAME or MYSQL_DATABASE or MARIADB_DATABASE This needs to be in the form of ĭatabase server type. Examples: īase URL of the installation, with protocol. Leaving this off will allow webtrees to be accessed over HTTP, but not automatically redirected to HTTPS. Setting this to any truthy value ( True, 1, yes) will enable a permanent 301 redirect to HTTPS. In this case, you must mount a directory containing webtrees.crt and webtrees.key certificates to the directory /certs/. Setting this to any truthy value ( True, 1, yes) will enable HTTPS. Setting this to any truthy value ( True, 1, yes) will enable pretty URLs. PhpGedView (PGV) Support for existing users of PGV who wish to transfer to webtrees. To administrators, or use the webtrees setup wizard. Kunena Template, Kunena Templates, Joomla forum template, Kunena 5. These environment variables will be visible in the webtrees control panel For any environment variable you do not define, There are many environment variables available to help automatically configure If you want to jump right in, take a look at the providedĭocker-compose.yml. This can be put behind a reverse proxy such as CloudFlare or Traefik, or Thanks a lot in advance, and please be patient, since I know pretty much nothing about computers.This is a multi-architecture, up-to-date, Docker image for I just want to know if there might be anything I can do with the boot menu or startup menu to allow me to even access safe mode, and if anyone can suggest anything I'd be really grateful, even if it means I have to actually take the thing apart myself - otherwise I'm going to have to pay a professional, which I imagine might cost a bit. Having read various hints and tips about blue screen of death that told me to start it up in safe mode I tried that, but when I do it doesn't even show the blue screen, it just stops dead and restarts, so that I can't get any further than the most basic startup menus. I've tried changing some settings in the boot menu so that I can get the blue screen to stay a little longer so that I can actually read it, but to no avail. Many users report that php-fpm does not work with webtrees 2. This happens when I try to start windows normally or in the last known good configuration. Visit the forum thread Have a nice day OVH debian jessie post-install script. As soon as the message flashes up, the computer restarts. Now whenever I try to turn it on I get a blue screen that flashes up far too quickly for me to read what the error message is. I'm running Windows XP on my desktop (as such I'm not even sure if this is a Windows problem or a hardware one, so I hope I'm in the right forum!), and after what might have been a dodgy download the computer restarted. Run CHKDSK to replay the journal Ġx11001 – Stub library has not been initialized Ġx11002 – Previous virtual stub manager exists Ġx11003 – Previous virtual stub manager does not exist Ġx11004 – Next Stub virtual manager exists Ġx11005 – Next Stub virtual manager does not exist Ġx11007 – Operation is not associated with the StubMan specified Ġx1100b – System reboot is required to complete the operation Ġx1100d – Can’t undelete primary partition inside extended partition Ġx1100e – Virtual container data block checksum is invalid Ġx11011 – Access violation at memory address. If the problem persists, use the MS-DOS mode version of PM Ġx100a4 – This operation is not implemented Ġx100a5 – It is not possible to perform the operation because the journal is not empty. Please make sure that all open programs are closed and press “Retry” to let PM to restart the operation. Please connect an appropriate device and restart the program Ġx1005c – Cannot perform the operation cause selected disk is not SSD Ġx1005d – Cannot perform the operation cause selected SSD disk is frozen Ġx1005e – Cannot perform the operation cause selected SSD disk is locked Ġx1005f – Cannot delete the file or folder Ġx10091 – Operation is cancelled by the user Ġx10092 – This operation is not supported Ġx10094 – Bio library has not been initialized Ġx10096 – The requested URL was not found on this server Ġx10098 – Session internal error has occured Ġx100a3 – PM is unable to complete the operation because Windows has performed a write to the source disk. It can occur when the restart data is saved/restored Ġx1001c – Partition parameters exceed the available limits Ġx10021 – Directory is invalid or not exists Ġx10028 – An unexpected error has occurred during file execution Ġx1002c – Invalid volume label (in partition deletion or backup operation) Ġx10031 – Invalid size of the partition image Ġx10036 – Invalid password for decryption Ġx10042 – Incompatible version components Ġx1004b – Failed to read the dynamic disk info Ġx1004f – Cannot access the file because it is mounted or being used by another process Ġx10050 – No restart-demanding operations are available for the locked partitions on physical disks Ġx10051 – Specified sector size is not supported Ġx10052 – No supported authentication method found Ġx10053 – Public key is not allowed for this user Ġx10054 – Unable to initialize private key from file Ġx10055 – Password authentication failed Ġx10056 – Specified cluster size is not supported Ġx10057 – Please select main archive file to open Ġx10058 – Logon failure: unknown user name or bad password Ġx10059 – No more connections can be made to remote computer Ġx1005b – None of the supported devices has been found. Run CHKDSK to fix it Ġx1001b – File I/O error. Below is the list of the possible error codes:Ġx00000 – Operation completed successfully Ġx10001 – Partition parameters exceed the disk limits Ġx10003 – Not enough space available (unable to create a partition of the requested size) Ġx10004 – No free block is available to create a primary partition Ġx10007 – The extended partition is not found Ġx1000a – The extended partition already exists Ġx10012 – No logical disk defined for this partition Ġx10013 – Unknown partition type (unsupported file system) Ġx10018 – File system error – file localization error (i.e. This, in conjunction with large pectoral fins, gives them very good maneuverability to swim through the flooded forest searching for their prey. Their cervical vertebrae are not fused, allowing the head to turn 90 degrees to each side. Amazon Pink River Dolphin – Boto – Inia geoffrensis In contrast with other cetaceans, in this case, the male is bigger than the female. With the adult males reaching an average length of 2.3 metres (7.6 ft) and an average weight of 150 kilograms (340 lb), and the females reaching a length and weight of 2 metres (6.6 ft) and average 100 kilograms (220 lb), they will not pass unseen by your side if you are navigating in their habitat. Distribution of Pink Dolphin sub-species in South America How does a Pink Dolphin look? Can you show me one? The pink dolphin is the biggest of all river dolphins. gangetica), predominant in India, and Indus river dolphin (P. They seem to have some relationship with their South Asian counterparts, the Ganges river dolphin (P. boliviensis) and Orinoco river dolphin (I. Pink dolphins (Inia geoffrensis) are a species of Toothed whales classified in the family Iniidae and it contains three sub-species: Amazon river dolphin (I. It inhabits South America, mainly in the Amazon river, but also in the Orinoco basin and Madeira river. Risso’s dolphins’ scars are really valuable to scientists because they allow them to identify individuals through photo-ID and understand the interactions between different species.The Amazon river dolphin, pink dolphin or Boto is a freshwater dolphin. Researchers also found bottlenose dolphins’ raking marks on juvenile Risso’s dolphins, which indicate that inter-species fights can happen too. Older males are usually almost entirely white, which attests to their dominance and long fighting history. After the wound heals, it loses its pigments, causing the animal to turn white gradually. These scratches come from other Risso’s dolphins scientists call this phenomenon “raking.” Raking is the act of scraping their blunt teeth against the skin of another dolphin during fights, play, or mating. Heavily scared individuals – Credit: Jim Capwell / Monterey Bay Aquarium The second type of scars we can find of Risso’s dolphins look like scratches. The first type is round-shaped scars are typically caused by other species like squid, lamprey, and cookiecutter sharks, a small species of sharks known to steal chunks of flesh from bigger animals occasionally. There are two distinctive types of scars. Scientists believe the scars are caused by the teeth of conspecifics and tentacles from their prey. Risso’s dolphins are easily recognizable because of the number of scars on their body, so much that they look almost white. To catch their prey, scientists believe Risso’s dolphins can hold their breath for over half an hour! What is the other function of Risso’s dolphins theeth? Individuals stranded on the Mediterranean coast were found to have 25 different species of squid in their stomachs. Risso’s dolphins are medium to deep divers and like to forage along the continental shelf, where they target squids. Squid is the favorite prey of Risso’s dolphins – Credit: Todd Winner Their teeth can be helpful, as they allow dolphins to secure the prey by pinching some of its soft tissue before slurping it. Instead, they tend to slurp their prey whole, which is the case here for Risso’s dolphins. As we mentioned in the introduction of this post, dolphins do not chew their food. With this low number of teeth, you might be wondering, “What do they eat?”. Their teeth are also located on their lower jaw only, just like sperm whales, although up to two pairs of teeth may be found in the upper jaw (this is a rare case). Risso’s dolphins’ low teeth count (between 4 and 14) is not the only particularity. Pilot whales are some of the closest relatives to Risso’s dolphins, and although their teeth count is pretty low compared to other dolphin species, they still have between 40 and 48 teeth. Risso’s dolphins belong to the Delphinidae family, with bottlenose dolphins, killer whales, and pilot whales. Risso’s dolphins have the lowest teeth count in all dolphins – Credit: Eric Austin Yee / Discovery Whale Watch Between 4 and 14 teeth only! Not because she was afraid of monsters, but because she feared her grandmother would die. I wanted to say something, anything, but how do you withdraw a declaration of war? How do you stop the bombs that already destroyed homelands? In that moment I remembered how she always told me that when she was a kid, she was too afraid to sleep with the lights on. But it wasn’t white and it wasn’t quiet, it resembled something like helplessness and rage. Last night, I told my mother “I wish I was dead” in a fit of rage and winter clouded her eyes. Ritika Jyala, excerpt from The world is a sphere of ice and our hands are made of fire ritika jyala the world is a sphere of ice and our hands are made of fire aesthetic art poetry hozier dark acadamia aesthetic literature lofi history quotes poets on tumblr dark academia light academia chaotic academia romantic academia lovecore cottagecore female artists artists on tumblr jane austen franz kafka film movies photography writeblr studyblr desiblr poem euphoria When does memory end and love begin? All I know is- she loved him before she remembered him. She saw this 6 foot 2 man with a scrubby beard and she didn’t know him but she said she trusted him, she asked him to hold her hand when she died. The only thing she remembered was her son’s name and when that began to fade, the one thing she always remembered was that she loved him, even in illness, even in insanity. He asked me when I fell in love with him and I knew it sounded dramatic to say the moment I saw him, so I told him this story of my grandma who had Alzheimer’s- she forgot her name and the words for fruit and food, she forgot her address and how to use the washroom, all her life lost to the disease. Ritika Jyala, excerpt from The Flesh I Burned ritika jyala the flesh i burned aesthetic art hozier poetry dark acadamia aesthetic lofi literature history quotes poets on tumblr dark academia light academia chaotic academia romantic academia writeblr studyblr desiblr female artists artists on tumblr lovecore cottagecore film movies jane austen franz kafka poem photography marvel I hope you go out in the sun and live a little, because tomorrow is 37.Įdit- I added the visualizer for this piece on my YT, check it out here And I know on some days you won’t be able to show anything of those 10 years but I hope you remember to breathe, and let go of the knot in your chest. Scents will remind you of childhood and certain friends you don’t talk to anymore, hangouts will become reunions and mom’s burnt pie will become the best food you ever had. The fury of youth will subdue and nothing will really change but everything will feel different when you look at old photographs and blurry videos taken on cheap mobile phones. There’ll be a moment when you realise you’re 27 when yesterday you were just 17 and you wouldn’t be able to tell how a decade passed away and your life got divided into before and afters. Ritika Jyala, excerpt from The world is a sphere of ice and our hands are made of fireĮdit: here’s the visualizer for this piece ritika jyala the world is a sphere of ice and our hands are made of fire aesthetic art hozier poetry dark acadamia aesthetic literature lofi history quotes poets on tumblr jane austen lovecore friends romantic academia cottagecore franz kafka artists on tumblr film books & libraries movies platonic chaotic academia desiblr writeblr studyblr dark academia dead poets society light academia It’s been 3 years since I lost my best friend, lost as in I still carry our secrets in a tiny box but we only text each other on our birthdays. And I wrote a poem that day and I titled it 'The dying of a best friend’ and I put all my love for her in a tiny box with my half of the matching pendant of a dolphin we had and stored them in a corner of my heart under the heading Grief. It took weeks, months- until one day I woke up and I realized I hadn’t thought of her in a while. Movies and books also don’t tell you that friendships don’t just end after one fight or incident, it’s like the rusting of a bridge, the slow decay of flesh and bones and secrets. Seeing her in streets is like breathing in a scent you forgot you knew but it immediately takes you back to a summer in ‘07. We were friends for a decade and knew each other’s diaries by heart, I still remember her phone number and the way she took her coffee. Movies and books don’t tell you that a friendship dying is like the sinking of a ship, you try to get higher and higher and hold onto the rails and unanswered texts, the captain tries to steer it to safety and salvage pieces of two broken hearts until you’re left with memories of what once was. I lost my best friend 3 years ago- not lost as in dead but lost as in we only text each other on our birthdays now. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |