Root vegetables

P1110821

I love food, so much so that I tend to have a strained relationship with it. Not that I always use food to problem solve, but I eat when I’m bored, nervous, or otherwise unoccupied.

I consider a scene in the TV show 30 Rock where Alec Baldwin’s character, Jack Donaghy, attempts to quit drinking. So instead of drinking, he knit a sweater.

30 Rock Replace the Ritual

I often defer to this mantra when changing my habits. Lately I have been eating more vegetables and when I am watching TV instead of sitting down I’ll paint at my easel. I don’t know if the art is that good, but it makes me happy and it is an activity that I lose myself in entirely.

The following recipe is something I tried today. I hope you enjoy it.

Prep time: 20 minutes

Cook time: 1 hour

Total time: 1 hour 20 minutes

Equipment:

1 Butcher knife

1 pairing knife

1 peeler

1 spoon

1 9″ x 11″ Pyrex dish

1 small bowl for optional sauce

Ingredients:

4 orange beets, peeled of blemishes, cut into four chunks

handful of rainbow carrots, scrubbed

1 butternut squash

1 bunch scallions

1 bunch basil

4 cloves garlic

1-2 Tbsp Extra Virgin Coconut oil

1 spoon

Optional Sriracha Greek yogurt sauce:

1 Tbsp Sriracha sauce

4 Tbsp Greek yogurt

Directions:

Preheat oven to 400ºF

Prepare vegetables:

Peel and chop butternut squash into 2″ x 3″ blocks. Set aside in Pyrex dish.

Wash four orange beets.  Scrub and peel blemishes off. Cut and quarter beets. Set aside in Pyrex dish.

Wash rainbow carrots. Peel if desired. Cut off root and end tips. Set aside in Pyrex dish.

Wash scallions. Pat dry. Finely slice. Distribute evenly over vegetables in Pyrex dish.

Crush and finely chop garlic cloves. Sprinkle evenly over in Pyrex dish.

Pour coconut oil evenly over vegetables in Pyrex dish.

Cook in preheated oven at 400°F for one hour.

When finished cooking, let sit for five minutes.

Optional Sriracha and Greek yogurt sauce:

Mix Sriracha and Greek yogurt together until blended in small bowl. Scoop desired amount on top of vegetables.

 

 

 

playlist

As I listen to songs on my playlist, the last thing I remember about them is I picked each of them out. I match up the feeling of the sound to the silent TV of movement that plays out on every screen ever known. I am alone sitting on the couch with nothing but my thoughts and mindless entertainment.

On HGTV there is a story of a young family moving away from home. From the states to the Middle East, they look out at their new home which sits on a man-made island, removed from the peril of what you might see in conflicted countries. Because the money builds places where you can escape to, a place free from fear and judgement. How on this globe there is no other escape from it except for complete isolation, and perhaps being a tourist in a foreign land grants us an imitation of this solitude.

There is a place I go sometimes to skip all of it. I tread water in the middle of a pond and my ears underwater hear something that I cannot describe to you, but it holds this feeling.

Because floating islands afford us the luxury of opting out of local unrest or the perils of life without silent agreements of democracy, there is something vague about leaving your home in exchange for an expatriate life. I remember how people have told me that when I move my problems move with me. I forget that I am inextricably linked. I feel like this is something similar to what moving to another country is, as similar as being put into a box that does not fit your expectations, or living in a town that has outgrown its admiration for you, or living in a snow globe. There is a connecting warmth.

hornutopia

hornutopia (noun): cornucopia + utopia + horn of plenty = hornutopia

I enjoy seeing successful models of shared experience that promote some sense of connectedness in this world. I like to think we are all sustainers of hornutopia, a judgment free zone where we can all be ourselves and foster a community of interconnectedness, where our freedom enables others to be free.

It reminds me of the TV show Community, where Troy and Jeff find a secret trampoline at the school. Joshua the groundskeeper explains what happens when you jump:

At the apex of each bounce, there is a moment outside of time, outside of words, outside of everything. A perfect moment, silent moment. I call it the world’s whisper.

I feel this way because I think that on the inside we all know that we’re monsters. We have all reconciled this idea at night, alone, wondering why we did something so evil or acted out of some dark intention. Everyone has flaws but I believe we are all better than our last act. We are not the worst part of ourselves, but we build contact points into a way of living that promotes hope, leaves no one out, and builds on something that was not there.

The theories of scarcity often make people feel alone, isolated, and destitute, but a lot of times when I have felt this way I realize I have whipped myself into a spinning vortex. The quicker I realize it the sooner I can make a different choice. Reaching outside the vortex means I make a conscious decision to ask for help where I need answers, listen to someone’s voice when I feel alone, or get outside my house and take a walk downtown.

the leash

I recently read an article about the idea of a dog being pulled on a leash:

https://wordpress.com/read/post/id/89696631/283

… and it made me think about freedom and what we’re allowed to think we’re in charge of. It reminds me of the Bright Eyes song Landlocked Blues, with a line,

…our freedom’s a joke, we’re just taking a piss.

Which begs the question, are we granted a freedom as a function of the fact that we use it or that we are mis-appropriating freedom to mean something entirely different than its original intended meaning? I think about Canadians and how they seem more civilly engaged than Americans. Sometimes it’s relative on the spectrum of possible outcomes, but it’s something I love contemplating.

The Green Place

Sometimes during the summer I like to go swimming. Oh who am I fooling? I always want to be immersed in some new body of water; it’s like braving a dangerous element in exchange for a feeling I cannot quite express. I cannot breathe underwater, but I can hear something down there that gives me a kind of strange comfort in a world that I cannot fully see but feel and understand with different senses. I will lay belly up with my ears underwater for hours just to look up and wonder at the sky.

Walden pond in Concord, MA, is a bell-shaped freshwater pond, and I’ll head there early in the mornings on some Sundays in August. Around the perimeter, there are these little private beaches, rock steps leading into the water. The place is welcoming and is a bit of a mirage, but it is very much there. I go there so seldom now it often slips from my memory, but it is not my imagination. The water has a magical feeling to it, and gets so warm in summer that it sustains life in different ways. A few summers ago, news outlets reported a strain of jellyfish was living in the water.  What did people make of it, a typically salt-water organism living in fresh water?

“Gwen Acton thought the dime-sized translucent pods she saw … were strange, beautiful seeds that had drifted down to the water surface from some flowering plant” (Daley, 2010).

Melissa Webster said, “We saw them on most of our swims during September, and on our last swim Oct. 1. Definitely cool” (Associated Press, 2010)!

Gsinger said, “I have been swimming in Walden for 30 years and had never previously seen them.  Has something changed” (Associated Press, 2010)?

Chris said, “This is a very scary event. They are a great danger to the native animals in the lakes and to the water. [T]his is a event that should be looked into with great con[c]ern is a sign of the danger nature is in” (Associated Press, 2010)

Although they pose no threat to humans, there was a variety of perceptions. Some were in awe, some were happy to see them, some were frightened, and others feared the apocalypse. The extent to which anything can tell us about being human is our perceptions. Anything we encounter can yield a feeling or impulse which people attach meaning to. It could be a jellyfish or something else.

Years before today our ancestors looked up at the sky and saw the sun and moon and told each other stories about what each one did. There were gods possessing great virtue that ruled the stars. There were heroes and villains entangled in legends of a shared narrative that people thought up which crafted some understanding as to what was going on in the world.

Today we know the sun and moon are planets that orbit our solar system. We have the answers to what we think are the big questions. We think we have it all figured out, and to a large extent, we do. A lot of what we place meaning on will propel us into the next age. Sometimes a jellyfish is bad, other times he is a fascination. What we do with these meanings will be reflected in our behavior.

This week I have been reflecting on how people think about things, namely bad things. Oops, there I’ve gone and placed meaning to something without thinking. This week I have been thinking a bit about computer security vulnerabilities and how they are perceived. What I found reminds me of the problems I have faced in my own life, and how those problems were thought of in that time. In retrospect, with what I know now about it, I consider these initial impressions to have fallen away or changed somewhat in my thinking.

The research I have done has changed my view of computer vulnerabilities as not something to fear for loss of one’s data, but rather an industry unto itself in a larger narrative that does not involve me directly, but rather my data and personal information. I am part of the bigger war, but I feel less a participant in it, less in control of my own personal information, and oddly more at peace with computer vulnerabilities than I thought I would.

I have often thought about it for a moment and forgotten it, a shell picked up on the shore and thrown back into the sea. I have stored up moments that I would like to feel have given me a sense of something, but then I remember how things in the past exist only in your mind. How you cannot take it out and measure it, but you can place a meaning onto something and that can be everything that it is now, so that all that is left is your impression of what used to be.

Sometimes your own conscious thought dissolves into the layers of waves how an ocean does, in the sense that your cognitive awareness doesn’t even have surface tension, so the points of arrival and departure are always changing, always different and new, reflective. This is how one person can have a thought about a thought. This sense, this wondering is an unfolding of constantly redeemed perks or chits that have no expiration date and whose value is changing in relation to meaning. These things may be only in the mind, but they are without a doubt changing and evolving as a direct function of one’s thinking and reflexive mind.

Are there known vulnerabilities in software that are rolled out without adequate testing? To answer this question, one need only think of one’s own individual computer experiences. Have you ever had a hard time using a computer? Yes. I have an impression of Microsoft that runs from a history of their long and confusing installation process, which makes it more challenging to add software to your computer. “On the Windows desktop, users have to open their browsers, search the web, download an application from a website, and install it manually” (“HTG Explains, 2015).

As a result, there are a number of things that can happen, including security breaches.

Many less-savvy users may end up downloading dangerous software or clicking a fake “Download” button that leads to disguised malware. Users may download and run potentially dangerous types of files, such as screensavers, without knowing that they contain executable code and can infect their system. People downloading pirated software from questionable websites may end up infected. (“HTG Explains,” 2015)

In comparison, Apple, whose built-in features make it simple to add programs, one can simply press a button and voila! The program is added without so much as pointing a finger and clicking. Apple users install applications and software “that come from a trusted, centralized repository. Users open their app store or package manager, search for the program, and install it” (“HTG Explains,” 2015). I have reflected on these two experiences, the Microsoft design and the Apple design, and balked.

Who would ever pay money on the experience of Microsoft? It creates a product in which outside services and repair are almost a requirement. There is a much higher risk of viruses as PC has been the target of the majority of worms.

Windows XP shipped without a firewall enabled and network services were exposed directly to the Internet, which made it an easy target for worms. At one point, the SANS Internet Storm Center estimated an unpatched Windows XP system would be infected within four minutes of connecting it directly to the Internet, due to worms like Blaster. (“HTG Explains,” 2015)

In addition, Windows XP’s autorun feature automatically ran applications on media devices connected to the computer. This allowed Sony to install a rootkit on Windows systems by adding it to their audio CDs, and savvy criminals began leaving infected USB drives lying around near companies they wanted to compromise. If an employee picked up the USB drive and plugged it into a company computer, it would infect the computer. And, because most users logged in as Administrator users, the malware would run with administrative privileges and have complete access to the computer. (“HTG Explains,” 2015)

Part of the problem is the intention of Windows’ original design. “Historically, Windows was not engineered for security. While Linux and Apple’s Mac OS X (based on Unix) were built from the ground-up to be multi-user operating systems that allowed users to log in with limited user accounts, the original versions of Windows never were” (“HTG Explains,” 2015).

DOS was a single-user operating system, and the initial versions of Windows were built on top of DOS. Windows 3.1, 95, 98, and Me may have looked like advanced operating systems at the time, but they were actually running on top of the single-user DOS. DOS didn’t have proper user accounts, file permissions, or other security restrictions. (“HTG Explains,” 2015)

Despite, or perhaps due largely in part to the existing vulnerabilities, there is an opportunity to profit on it. When one is looking at the framework of insecure computer systems as an object not of dread and avoidance, but rather a part of a larger economic system, things start to look different. The research I came across includes an article published in Time magazine from July 2014 titled “The Code War”.

The idea that a software bug can be worth actual dollars and cents is an odd one. Bugs are mistakes; people generally pay money to fix them. The fact that there’s a market for them is a consequence of the larger oddness of our present technological era, in which our entire world — our businesses, medical records, social lives, governments — is emigrating bit by bit out of physical reality and into the software-lined innards of computers in the form of data. A lot of people are interested in that data, for reasons both good and bad. Some of those people are spies. Some of them are criminals. Bugs are what they use to get at it. (Calabresi, Frizzel, & Grossman, 2014)

The Time article interviews Aaron Portnoy, co-founder of Austin-based Exodus (Calabresi et al., 2014). Portnoy’s career began as a high school student where he hacked into computer system at the Massachusetts Academy of Math & Science in Worcester (Calabresi et al., 2014). Where Aaron’s initial hacking career dovetails in with his current project is his love of hacking.

Portnoy, now 28, is the co-founder of a two-year-old company in Austin called Exodus Intelligence. Its mission statement reads, “Our goal is to provide clients with actionable information, capabilities, and context for our exclusive zero-day vulnerabilities.” Which means — translated from the quasi-paramilitary parlance that’s endemic to the software-security industry — that Exodus Intelligence finds and sells bugs, specifically the kind of bugs that could potentially give a third party access to a computer, the same way Portnoy got access to his high school’s network. They’re worth a lot of money. Vulnerabilities in popular applications and operating systems have been known to change hands for hundreds of thousands of dollars each. (Calabresi et al., 2014)

The industry of computer vulnerabilities is an enormous and international one. For example:

in May [2014] when the U.S. indicted five members of the Chinese army for stealing data from American companies, including Westinghouse and Alcoa. That wasn’t an anomaly; it’s the norm, and it’s getting more normal all the time. Retired Army general Keith Alexander, who formerly headed both the NSA and U.S. Cyber Command, has called China’s ongoing electronic theft of American intellectual property “the greatest transfer of wealth in history.” Two weeks ago several security firms confirmed that a group believed to be backed by the Russian government has been systematically hacking the U.S.’s energy infrastructure since at least 2012. According to IBM’s security division, the average American company fielded a total of 16,856 attacks in 2013. (Calabresi et al., 2014)

The history of computer vulnerabilities goes back twenty years.

In 1995 Netscape announced a “Bugs Bounty” program that paid cash to anybody who could find flaws in its browser. The company … just wanted to fix holes in its software. In 2002 a security firm called iDefense started buying up vulnerabilities of all kinds; another company, TippingPoint, launched a similar program in 2005. Both programs were created as alternatives to the increasingly active and chaotic exchange of zero-days on the open market — essentially they acted as safe zero-day disposal facilities, a bit like radioactive-waste repositories. If you found a bug, instead of selling it to the highest bidder, who would do God knows what with it, you could sell it to iDefense or TippingPoint for a reliable price, and they would alert their clients to the problem and work with the software vendor to get the bug patched. iDefense and TippingPoint had something else in common too: they both, in successive years, 2005 and 2006, hired an intern named Aaron Portnoy. (Calabresi et al., 2014)

What Portnoy does now is not so different from his internship at TippingPoint. At Exodus, nine engineers sit at computers all day:

banging on software looking for ways in: browsers, email clients, instant-messaging clients, Flash, Java, industrial control systems, anything an attacker could use as an entry point. “One thing we try to maintain is a capability in every major backup software out there, because that’s one of the juiciest targets,” Portnoy says. “If you get on an enterprise network, what is an administrator going to want to protect? Their important information. What do they use to protect that? Backup software.” (Calabresi et al., 2014)

When a researcher at Exodus finds a vulnerability, he or she types it up in a professional-looking report along with technical documentation that explains what it does, where it lives, what it gets you, how to spot it, what versions of the software it works on, how one could mitigate it and so on. Most important, Exodus provides you with an exploit, which is the procedure you’d have to follow to actually trigger the bug and take advantage of it. “Every single vulnerability that we give our customers comes with a working exploit,” Portnoy says. “If we can’t exploit it, we don’t even bother telling anyone. It’s not worth it.” Voilà, one freshly minted zero-day vulnerability. (Calabresi et al., 2014)

Portnoy takes pride in the superior quality and effectiveness of Exodus’ exploits. “We try to make them as nasty and invasive as possible,” he explains. “We tout what we deliver as indicative of or surpassing the current technical capabilities of people who are actually actively attacking others.” When a company hires Exodus, it does so on a subscription basis: you get a certain number of bugs a year for such-and-such amount of money. Subscriptions start at around $200,000. (Calabresi et al., 2014)

The vulnerabilities business has a mixed reputation, based on the presumption that the bugs it provides are being used for criminal or unethical purposes. A Washington, D.C., company called Endgame that sold vulnerabilities to the government for years was dubbed “the Blackwater of hacking” by Forbes magazine. Last year, when Endgame announced that it was getting out of the game, it did so triumphantly, as if it were kicking a heroin habit: “The exploit business is a crummy business to be in,” its CEO said. (Calabresi et al., 2014)

The reality is more complex. Exodus’ clients come in two basic types, offensive and defensive. Playing for the defense are security firms and antivirus vendors who are looking for information they can integrate into their products, or who want to keep their clients up to speed on what threats are out there. On offense are penetration testers, consultants who use Exodus’ zero-days to play the “red team” in simulated attacks on their own or other people’s networks. “If they want to show what a real attack would look like from a determined adversary,” Portnoy says, “we give them the tools to do that.” (Calabresi et al., 2014)

As far as one confirmed fear will take you, there is comfort in the fact that many computer vulnerabilities, malicious bugs, and computer worms exist, as part of the general landscape always will, for a hefty profit. As the author Chuck Palahniuk writes, men will be “slaves to the IKEA nesting instinct” (Kopal, 2009). Women will believe they are less than gorgeous beasts until they consume millions of dollars in beauty products to make them whole again. Kids will buy all the music they want knowing that they are what they like, not who they are based on personality, values, or behavior, found and maintained through authentic human interaction or genuine relationships with other people.

One can sleep soundly by taking a sedative of life, by truly not worrying over the thought that your online life is being exploited by some personal vendetta or a deeper need to defame your character. Those fears are for the people who buy and sell the glitches that get our data. It puts to bed all the paranoid claims that lie awake with you at night, toiling, wondering as you look up at the ceiling. To get out of this half make believe world made mostly of wires, one must find a green place, free from the dry desert you once thought was the barren lands. You must stop searching out there in the mirage and come home. Know you are part of the wasteland, and be thankful it’s not just all about you.

Related articles:

https://ourtrickstime.wordpress.com/2015/09/16/the-top-five-hacking-tool-of-2015/

https://dguiney.wordpress.com/2015/09/15/hacking-team-computer-vulnerabilities-and-the-nsa/

  References

Associated Press. 2010, Sep. 10. Mysterious Jellyfish Invade Walden Pond. Retrieved from

http://www.wbur.org/2010/09/10/mysterious-jellyfish

Calabresi, M., Frizzel, S., & Grossman, L. Jul. 21, 2014. The Code War. Time. 184(3), 18-25.

http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=96981364&site=eds-

live

Daley, Beth. 2010, Sep. 10. Mystery Blooms on Walden Pond. Retrieved from

http://www.boston.com/news/science/articles/2010/09/10/mystery_blooms_on_walden_pond/

Kopal, Indira. 2009, Oct. 19. Tyler Durden’s anti-consumerism quotes. Retrieved from

http://indranikopal.blogspot.com/2009/10/tyler-durdens-anti-consumerism-quotes.html

HTG Explains: Why Windows has the Most Viruses. 2015. Retrieved from

http://www.howtogeek.com/141944/htg-explains-why-windows-has-the-most-viruses/

Vorticism

Until I watched the movie Blazing Saddles as an adult I never realized that I enjoy the ending the best. It’s a spaghetti Western that pokes fun at gender, race, and politics. Oh yeah, it’s got fart jokes, too, which before I get too far in I also recall something about the banality of old film. Having watched it recently in mixed company, I realize this may very well be the best last film made for men. Our little watching group wondered who would star in the remake. Would Amy Schumer play Madeline Kahn’s part? Maybe Dave Chapelle could be beckoned back to play the sheriff. We lingered for a minute at best, declaring that no one would ever be caught dead doing a remake of Blazing Saddles because it just couldn’t be done today. Too much tension. Too many waves. All fart jokes aside, certain things don’t translate well into the parlance of our time.

Within the final twenty minutes of the film, the camera pans out past the Western sun to reveal the Hollywood studios in which the sets were built and scenes were filmed. One of the final cowboy fight scenes interrupts Dom Deluise directing dancers on a closed set, where tuxedoed men show down against dudes in bandanas and chaps. Then the mob blows through the actor’s cafeteria, where everyone ends up pie-faced. The meta feel was just right on. I had begun to get the feeling they were making an actual movie there. Boy was I wrong.

I forget so much of life is not just one thing. It’s the many things we cannot see now that must awaken in us hope, a less pointed movement to the disappearing headline. I love the Beach Boys’ Pet Sounds album. Recently thumbing through an online discography, I realized there are many repeated songs in slightly differently performed ways. Over half of their albums have mono and stereo versions of the same tune, or digitally remastered versions set to entirely new albums. I came across the Smile Sessions boxed set, where there are 24 different tracks of Good Vibrations and 38 songs titled Heroes and Villains in varying takes and remixes. In Holland remastered, California Song comes in three versions: Big Sur, the Beaks of Eagles, California. Pied Piper appears twice in different lengths, one at 2 minutes 20 twenty seconds, the other at 2 minutes 9 seconds. This is the land of new technology, at best offering version 2.0 of the same thing you bought last year. At worst it lets the nerds discuss, degree by degree, permutations of their specifically turning desires.

I like the repeated versions, the slightly similar embodiments of creativity drafted out into the finished product. It says more about the way people can attribute a mood or feeling to something so trivial as the presence of a triangle ding or the extra three measures at the end of a verse, or how through so much effort we see simply some different rendition of our own preferences.

It also speaks to a larger narrative of how our own internal rhythms are staged and performed over and over, throughout our lives, which makes me think about family movies on old-fashioned 8mm movie projectors. They are a nearly extinct medium played on a reel that burns a little bit of the end frames. The stopping is so hard against the light, if you simply set a frame of film down on the bulb within seconds it sets fire. I burn a bit in the process of finding my younger self. I forget it’s me out there, it’s me every time. I may be taking something for granted. Or maybe it’s not this, not what I can see from this perspective.

The convenience of today is not so much in the hardware, but the software. A ton of the data from websites and online businesses are plucked from a cloud. Floppy discs are obsolete. Items with no digital interface that cannot be shared or distributed over social media have less value until they are scanned and uploaded into the web. One’s cell phone provides the clearest view of a captured sense of something and its feeling therein. Many ways of looking at things, old photographs on 35 mm film, are oddly unappealing, and I say this because we are re-appropriating the way we see things. If other people do not see it, it doesn’t exist. It is giving more credence to the term if a tree falls in the woods, does it make a sound? It does not until it creates an electrical impulse inside the human ear.

Things that are not witnessed by many people do not make an impact. They are not what you can most easily see with anymore, and by you, I mean the royal you. On the TV show Star Trek: The Next Generation, the Borgs were part computer, part human. They assimilated everyone they came into contact with, except for Picard, as he kept some of his human memories inside of him, which helped hoist himself free from the ice block of the collective unconscious. I wouldn’t go so far to say that our Facebook accounts are us, but maybe it’s the closest thing to this sentiment that I can find right now.

I often forget to look up, up and away and distract myself from this. I often forget about the meaning of things, to look out and away from the face of something close up and just look away so that the things in the background are in focus. When I was in kindergarten I used to count the grades I had until I would be done with public school. I recall how impossible it seemed to get through twelve more years of suffering. I always try to think of life this way, a series of suffering years one must endure to get to the good times, and then I remember to look at things from far off, breathe, step out of the vortex.

Records and rackets

CAM00170I hope to one day string together the things I do not need and see them through to their meaningful ends. Football and beer, both American pastimes, are joint clichés. Sometimes I think about the movie Big Business starring Lily Tomlin and Better Midler and recall the mirror scene, where Midler and her twin sister parrot each other’s movements until they reach a level of certitude that the reflection has pulled away from itself. Certain things I back away from, being predictable, and strangely tonight I only timidly pick apart the alikeness in me.

Although destined for oneness, there is a reckoning that splits the atom. In a snow globe there is no weight. The confetti falls where everything is free. A friend of mine works in a bottling plant. He says the term they use for opened or damaged cases is breakage. At his old job, he was allowed to bring home a certain number of breakage bottles a week. He gave me one piece of advice: always go where the beer is free. Free beer tastes better than anything you ever pay for.

Tonight on the way home from work I swing by the Drinking Consultants. It’s this place I like because it’s got a great selection and the dudes are cool. I picked up a case of my favorite beer by Uinta brewery. It’s a twelve pack of half Hop Nosh, half Trader IPA. There are missing cans so the guys at the store sell it to me for half off. They’re cool like that. I thank them and tell them I’ll be back next week for an unopened version of this.

Summertime in New England is when the higher ABV beers are too caloric and filling, so I resort to the light mirage of a drink that I can be light with. Nothing gets heavy. Trader IPA is a session beer, so it levitates. I sit on the couch intently writing about this idea, how things are so light they are almost unseen, unknowable in their limitation.

I am watching the men’s US open in tennis, Roger Federer vs. Steve Darcis. The match is something I sense going on in the background as my new record plays. I got Depression Cherry by Beach House today. Living in tandum with so many wonderful things, I like to think life is a bit of treading water into our sinking oblivion of ourselves. I like to get lost when I am feeling other things.

Session drinks have less than or equal to 4% alcohol by volume (“The Session”, 2015). Aaron Goldfarb of Esquire magazine defines the term sessioning as one’s ability to drink as much as one likes from four in the afternoon until bedtime without getting truly wasted. I reappropriate the term limitation of flavor as the certainty that I can enjoy myself without needing a nap. Although some of the flavor is changed in its lightness, I can see through things and onto the next thing standing across from itself into a new mirror.

Related articles

https://wordpress.com/read/post/id/64802305/271

https://wordpress.com/read/post/id/43126004/3286

https://wordpress.com/read/post/id/71179941/269

https://wordpress.com/read/post/id/56216772/1043

References

Goldfarb, Aaron. 2014. Why the ‘Session’ beer makes zero sense. Retrieved from http://www.esquire.com/food-drink/drinks/a30663/session-beer-is-dumb/

The Session Beer Project. 2015. Retrieved from http://sessionbeerproject.blogspot.com