SlideShare una empresa de Scribd logo
1 de 14
HOW TO WRITE CYBERPOETRY   www.cyberpoetry.com
1.  Definition: Poetry & Cyberpoetry 2.  The Marriage of Technology and Art 3.  What Came First the Chicken or the Egg? 4.  Examples of Cyberpoetry  5.  Tip No. 1: Read, read, read! 6.  Tip No. 2: Write, write, write!   INDEX
Poetry  (n): is a form of art in which language is used for its aesthetic and evocative qualities in addition to, or in lieu of, its ostensible meaning. (Wikipedia) Now let´s define Cyberpoetry based on the above: Cyberpoetry  (n): is a type of poetry that utilizes technological terms and concepts, especially related  to computers, programming languages and operating systems. DEFINITION OF POETRY & CYBERPOETRY
Since Cyberpoetry is a type of poetry, the same structure and rules of poetry apply.   •  Cyberpoetry is also written in  verses  which have a  beat  and  rhythm .  Yet as a Cyberpoet myself, I feel  that Cyberpoetry expands the possibilities of  rhythm and beat beyond those of poetry — who  can argue with the fact that “binary poetry” and its  sequence of 0’s and 1’s  have intrinsic rhythm? SIMILARITIES BETWEEN POETRY  & CYBERPOETRY
•  Use of  irony ,  metaphors ,  symbolism ,  simile  are  tools of the trade of the two of them: Poetry and  Cyberpoetry.  •  Cyberpoetry and poetry both have a “ layering of  meanings ”, yet, according to my experience,  Cyberpoetry draws from a source of inspiration  which is vaster, because it adds the digital  dimension to that of the poetic muses. SIMILARITIES BETWEEN POETRY  & CYBERPOETRY
Cyberpoetry can be seen as an exponent of the  marriage of art and technology.   But, which one came first of these two, art or  technology, the chicken or the egg?     Well, sometimes technology drags art, and at other  times, it´s the other way around.   Leonardo DaVinci  drew on paper the helicopter  centuries before technology made it possible.  ART & TECHNOLOGY:  THE CHICKEN & EGG DILEMMA
Jules Verne  wrote about space travel and submarines many decades before they became a reality. But on the other hand, sometimes technology is the inspiration for art--  George Gershwin  incubated in his heart and head the idea for  Rhapsody in Blue  while on the train journey to Boston: “ It was on the train, with its steely rhythms, its rattle-ty bang, that is so often so stimulating to a composer...  I heard it as a sort of musical kaleidoscope of America, of our vast melting pot, of our unduplicated national pep, of our blues, our metropolitan madness”   ART & TECHNOLOGY:  THE CHICKEN & EGG DILEMMA
These examples were taken from the e-book “Cyberpoetry & Cyberhumor”  ( www.cyberpoetry.com ) Example #1 REEBOOTING IS LOVING YOU A LITTLE BIT MORE   Every time I think of you, my system reboots, magically putting me in your HOME directory. CYBERPOETRY EXAMPLES
Example #2 OPTIC-MOUSE LOVE   You´re the red guiding light of an optic mouse, gliding across the unconditional grid of my heart   CYBERPOETRY EXAMPLES
THE FOR LOOP OF A BLENDER     $ cat blender for i do Take those red tomatoes rip them apart mix them with the peppers disjointing them both, the onions & garlic had no other choice but to blend in fast and for good round ‘n round all of them go screeching to ears   that pretend to be deaf hurriedly orbiting around my shiny stainless steel blade till all that´s left of them is a thick, yummy sauce!! done CYBERPOETRY EXAMPLES  Example #3
A LOVE FOR HACKER     Hacker, hacker,  access freely all my paths, “ vi” into my most intimate files, and “more” my .login script, or “ed” my password file. Nobody knows me, as well as you do. I´ve sworn I´ll write no permissions to bar you, from being who you are a hacker at heart, roaming my CPU with fondling curiosity. Can´t but love your hacking around! because you know whoami and whereIwannabe, Hacker, hacker, “ chdir” about, to the obscure depths of my hierarchical system, till you find that long encrypted love file to which I´m positively sure you hold the only <key> that can decode it!   CYBERPOETRY EXAMPLES  Example #4
Like with everything else in life, mastery is achieved only through practice.  So my first advice if you want to write Cyberpoetry is: WRITE, WRITE AND WRITE !!! ADVICE No. 1
Read, read and read .  Read everything you can, from Beowulf to... And I really do mean everything: Shakespeare,  Robert Frost, Sylvia Plath, e.e. cummings, etc.  so you learn about poetry   and have the tools to  become a CYBERPOET ! ADVICE No. 2
HOW TO WRITE CYBERPOETRY   [email_address] www.cyberpoetry.com

Más contenido relacionado

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Destacado (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

How To Write Cyberpoetry

  • 1. HOW TO WRITE CYBERPOETRY www.cyberpoetry.com
  • 2. 1. Definition: Poetry & Cyberpoetry 2. The Marriage of Technology and Art 3. What Came First the Chicken or the Egg? 4. Examples of Cyberpoetry 5. Tip No. 1: Read, read, read! 6. Tip No. 2: Write, write, write! INDEX
  • 3. Poetry (n): is a form of art in which language is used for its aesthetic and evocative qualities in addition to, or in lieu of, its ostensible meaning. (Wikipedia) Now let´s define Cyberpoetry based on the above: Cyberpoetry (n): is a type of poetry that utilizes technological terms and concepts, especially related to computers, programming languages and operating systems. DEFINITION OF POETRY & CYBERPOETRY
  • 4. Since Cyberpoetry is a type of poetry, the same structure and rules of poetry apply. • Cyberpoetry is also written in verses which have a beat and rhythm . Yet as a Cyberpoet myself, I feel that Cyberpoetry expands the possibilities of rhythm and beat beyond those of poetry — who can argue with the fact that “binary poetry” and its sequence of 0’s and 1’s have intrinsic rhythm? SIMILARITIES BETWEEN POETRY & CYBERPOETRY
  • 5. • Use of irony , metaphors , symbolism , simile are tools of the trade of the two of them: Poetry and Cyberpoetry. • Cyberpoetry and poetry both have a “ layering of meanings ”, yet, according to my experience, Cyberpoetry draws from a source of inspiration which is vaster, because it adds the digital dimension to that of the poetic muses. SIMILARITIES BETWEEN POETRY & CYBERPOETRY
  • 6. Cyberpoetry can be seen as an exponent of the marriage of art and technology.   But, which one came first of these two, art or technology, the chicken or the egg?     Well, sometimes technology drags art, and at other times, it´s the other way around.   Leonardo DaVinci drew on paper the helicopter centuries before technology made it possible. ART & TECHNOLOGY: THE CHICKEN & EGG DILEMMA
  • 7. Jules Verne wrote about space travel and submarines many decades before they became a reality. But on the other hand, sometimes technology is the inspiration for art-- George Gershwin incubated in his heart and head the idea for Rhapsody in Blue while on the train journey to Boston: “ It was on the train, with its steely rhythms, its rattle-ty bang, that is so often so stimulating to a composer... I heard it as a sort of musical kaleidoscope of America, of our vast melting pot, of our unduplicated national pep, of our blues, our metropolitan madness” ART & TECHNOLOGY: THE CHICKEN & EGG DILEMMA
  • 8. These examples were taken from the e-book “Cyberpoetry & Cyberhumor” ( www.cyberpoetry.com ) Example #1 REEBOOTING IS LOVING YOU A LITTLE BIT MORE   Every time I think of you, my system reboots, magically putting me in your HOME directory. CYBERPOETRY EXAMPLES
  • 9. Example #2 OPTIC-MOUSE LOVE   You´re the red guiding light of an optic mouse, gliding across the unconditional grid of my heart CYBERPOETRY EXAMPLES
  • 10. THE FOR LOOP OF A BLENDER   $ cat blender for i do Take those red tomatoes rip them apart mix them with the peppers disjointing them both, the onions & garlic had no other choice but to blend in fast and for good round ‘n round all of them go screeching to ears that pretend to be deaf hurriedly orbiting around my shiny stainless steel blade till all that´s left of them is a thick, yummy sauce!! done CYBERPOETRY EXAMPLES Example #3
  • 11. A LOVE FOR HACKER   Hacker, hacker, access freely all my paths, “ vi” into my most intimate files, and “more” my .login script, or “ed” my password file. Nobody knows me, as well as you do. I´ve sworn I´ll write no permissions to bar you, from being who you are a hacker at heart, roaming my CPU with fondling curiosity. Can´t but love your hacking around! because you know whoami and whereIwannabe, Hacker, hacker, “ chdir” about, to the obscure depths of my hierarchical system, till you find that long encrypted love file to which I´m positively sure you hold the only <key> that can decode it! CYBERPOETRY EXAMPLES Example #4
  • 12. Like with everything else in life, mastery is achieved only through practice. So my first advice if you want to write Cyberpoetry is: WRITE, WRITE AND WRITE !!! ADVICE No. 1
  • 13. Read, read and read . Read everything you can, from Beowulf to... And I really do mean everything: Shakespeare, Robert Frost, Sylvia Plath, e.e. cummings, etc. so you learn about poetry and have the tools to become a CYBERPOET ! ADVICE No. 2
  • 14. HOW TO WRITE CYBERPOETRY [email_address] www.cyberpoetry.com