Poem of the month: How to Do Absolutely Nothing by Barbara Kingsolver | The Guardian

The best recent poetry – review roundup Rent a house near the beach, or a cabinbut: Do not take your walking shoes.Don’t take any clothes you’d wearanyplace anyone would see you.Don’t take your rechargeables.Take Scrabble if you have to,but not a dictionary and nopencils for keeping score.Don’t take a cookbookor anything to cook.A fishing pole, okbut not the line,hook, sinker,leave it all.Find outwhat’sleft.• How to Fly (In Ten Thousand Easy Lessons) by Barbara Kingsolver is published by Faber (£14.99). To order a copy go to guardianbookshop.com. Delivery charges may apply. Continue reading…

Rent a house near the beach, or a cabin
but: Do not take your walking shoes.
Don’t take any clothes you’d wear
anyplace anyone would see you.
Don’t take your rechargeables.
Take Scrabble if you have to,
but not a dictionary and no
pencils for keeping score.
Don’t take a cookbook
or anything to cook.
A fishing pole, ok
but not the line,
hook, sinker,
leave it all.
Find out
what’s
left.

How to Fly (In Ten Thousand Easy Lessons) by Barbara Kingsolver is published by Faber (£14.99). To order a copy go to guardianbookshop.com. Delivery charges may apply.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more