Joined

JOINED

Heart beat of man pounding - yet
unheard joined becomes the beat of a nation.

Words of man written - yet
unread joined becomes a proclamation.

Sounds of man spoken - yet
unheard joined becomes a production .

Lines of man drawn - yet
unrecognized joined becomes an illustration.

Beings of man humming - yet
forgotten joined becomes a celebration.

Patterns of man created - yet
invisible joined becomes a new universe.

Joined we become recognized.

Susan "Sue" Bacon Trumpfheller is an author, teacher, researcher and coach. Sue works with her clients to use subtle energies to create their supportive environments. You can contact her at http://www.ecoentrepreneur.org

disinfecting cleaning services Winnetka ..
In The News:

Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.

Three Poems and Paradise Lost [One for Hell, One for Heaven one for an Inca King]

The Torrents of HellHell's furnace- Likened to a chimney Vomits... Read More

The Plane from Iquitos [1959-Part One]

Iquitos & the Amazon Part OneIt was December 2, l959,... Read More

Song of the Great Zimbabwe, and Silver and Inca Blood [Poems and notes]

"Song of the Great Zimbabwe"Across the African, winter's skyIn the... Read More

The Last King of Mars [A Poetic Mytho]

[As Told by the Last] King: it was in the... Read More

Three Poems (While in Transition/English and Spanish)

Here are three more poems by the author, Dennis Siluk,... Read More

Top 20 Poetry Quotations

Explore the meaning of poetry and the motivation of poets... Read More

Two Poems and an Analysis [?Witness,? & ?An Old Love?]

Two Poems and an Analysis ['Witness,' & 'An Old Love']WitnessMy... Read More

Five Mixed Poems, with Notes [now is Spanish and English]

1.Night in Jamaica [Peruvianism: 1810]It was a rainy night... Read More

Sleep, Dreams, and a Poem

The Incubus' Flash-lightHe looked inside my head And found a... Read More

Eds Poem

Ed Gallagher Dec. 11, 1907 - Sept. 5, 2004This poem... Read More

Two Poems and a Short Story

1)dying in the bar [sluggishly]yet, I would crawl too upto... Read More

Two Poems Written During Recovery

Since my wife and I are moving, or preparing to... Read More

Our Home

Our home was warm in the shade of the trees... Read More

Rules for Writing Poetry

You've been writing poetry since that first assignment in your... Read More

Growing

Growing hurts sometimes; saying goodbye to friends, ... Read More

Shakespeares Sonnet XVIII, Shall I Compare Thee to a Summers Day?

Shakespeare's sonnets require time and effort to appreciate. Understanding the... Read More

Barriers

There are many times I set up barriers and walls,... Read More

Caught in the Arms of ED

YOU MIGHT THINK I AM STRONGI THINK YOU GOT IT... Read More

Become A Poet In Ten Minutes

Have you ever sat there staring at the paper, ready... Read More

Learn About Love From Poet Rumi

In this modern age of technology, busy lifestyles, and obsession... Read More

Africa

AFRICA (to africans in diaspora)africa here i come, africa africa... Read More

Three Poems: The Monkey Man of Lima, Plus Two More

What Hides behind the Minute?What hides behind the minute? It... Read More

Opposites Do Attract Quite Well

When I am climbing up, you are stepping down. When... Read More

Blind Designs [a Poem] and a Note by Rosa on The Other Door

Blind DesignsBorn today, gone tomorrow Like a butterfly with no... Read More

Three Poems: Dona Leonors Revenge; The Old Moon; Common Sides [All in Spanish/all in English]

1) Do?a Leonor's Revenge [1627 AD]Rafael Ortiz's fate Was... Read More

last minute cleaning help Highland Park ..