Books

  • Books:
  • Carnivorous
  • Blood Horses,
  • Beneath The Ice,
  • Snakeskin Stilettos,
  • The Horse's Nest,
  • Miracle Fruit,
  • Selected Poems,
  • The Goose Tree

About Me

My photo
Poet, creative writing facilitator, editor. Experienced mentor for those working towards a first collection. My publishers are Lagan Press, Belfast and Liberties Press, Dublin, who published my Selected Poems in 2012, The Goose Tree in June 2014. Blood Horses was published in 2018 from Caesura Press www.caesurapress.co.uk and a new collection, Carnivorous was published from Doire Press Spring 2019 www.doirepress.com Awarded an Arts Council of NI Major Artist Award in 2019

Saturday 25 April 2020

Growing things

A link to the lovely Pendemic website and a small poem of mine - lots of other great stuff to read too.

http://pendemic.ie/growing-things-a-poem-by-moyra-donaldson/?fbclid=IwAR3vezdoxjHhGrX--33j35g5-IF7LDXWyvmEIZBKnffwriBz88P_F9q3eh8

1 comment:

  1. RECOVERY OF LOST FUNDS:
    ARE YOU A VICTIM OF THE BINARY OPTIONS, BITCOIN and LOAN SCAM?
    Meet THE GLOBALKOS HACK RECOVERY TEAM.

    WHO ARE THE GLOBALKOS?
    GlobalkOS is a vulnerability coordination agency that enact penetration appraise to help victims who are faced with cyber challenges get back on their feet.
    Although hiring a professional hacker has been one of the world's most technically valued navigating information, our community of investigative cohort spans across the globe making us pretty outstanding on this subject.

    The recovery is achieved using a session encryption protocol whereby the locations and data of a deceptive provenience are traced into their monetary base system. Our community of investigative cohort spans across the globe making us pretty outstanding on this subject.

    However, The crucial benefit of contacting The Global-KOS hackers is• ZERO TRACE: After a successful hack recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our hacks to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. So in a nutshell, attackers' efforts on this platform are useless. The reason is because our server is protected with a vigorous firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous. Secondly, the company is large enough to provide a comprehensive range of services such as. • MOBILE PHONE HACKS.(Catching A Cheating Spouse)
    • CREDIT SCORE UPGRADE,
    • PENETRATION OF WEBSITES AND DATABASE.
    • UNLOCKING FROZEN CRYPTO WALLET
    • EMAIL HACKS
    • HACKING A FRAUDULENT WEBSITE.
    • UBER FREE PAYMENT LICENCE.

    For prolific services and info,
    Contact:
    ✉️Email: theglobalkos @ gmail . com
    leroysteckler @ gmail . com
    ®Global KOS™
    2020

    ReplyDelete