Literary Days:
Tom Veitch: C Press: $1
I know of three
American “novelists” whose work deserves if not more money and recognition then
at least more praise: Harry Mathews (The Conversions), Kenneth Koch (The Red Robins) and Tom Veitch (What’s, a Psychic Novel). Selections from Mr. Veitch’s novel as well as
other prose pieces by him have recently been published under the title Literary Days. These short selections read like one
continuous story. They demonstrate, to
me at least, that Mr. Veitch is an extremely talented and interesting writer,
so interesting that William Burroughs, upon reading Literary Days, was prompted to scan, shift and intersect it. Also, Mr. Veitch is young (23).
In person Mr. Veitch is
immodest and shy, so much like one of his characters that few people believe in
his existence. Where is “he” in his
“work?” Ask that question but never try
to answer it. Mr. Veitch’s characters
don’t seem very worried about their identities; in fact, there don’t seem to be
any characters in his work, though there are many proper names, such as
Nana-bana-dog, Tristan Tzara, Maw and Pa, Thom, as well as he, she, it and I.
Besides being “the best
comic writer since” himself, Mr. Veitch manages to write sweetly. Not honey and doves, because I don’t think he
is interested in honey or doves, since they are after all jokes, and he does
not tell jokes. His comedy is sustained
by moral force and probably also by the joy of knowing that the work he does is
new, interesting and likely to inspire someone else. I find no trace of black nausea in his work.
His favorite theme is
“childhood”:
I offered him a cup of hot tea from
my thermos, and he drank it with great thirst.
“What’s the matter kid?” I said in his native tongue.
“Mirobbila ses tid fos vol jok roc
yot gim boy boy!” he screamed
I assented and gave him one.
“Fok,” he said.
His second favorite
theme is food:
Between that time and my
twenty-eighth year my literary activity was furious. I attended every literary tea and dinner from
August 28th, 1940 to July 17th, 1951, which amounted to over 4,399 teas and
9,821 dinners, at which I consumed a total of 10,732 gallons of tea, 8,440
assorted cakes and cookies, 9,821 steak dinners, 18,024 glasses of wine, 15,555
toothpicks, 24,778 sardine sandwiches, 62,001 cheese crackers, 88,201 pieces of
string bean, 400,700 (approximate) spoonfuls of mashed potatoes, 14,290
alka-seltzers, and 1,904,799 assorted confections, desserts, tarts, pies,
vegetables, soups, demi-tasses, cups of coffee, appetizers, sandwiches, crumbs,
fruits, pills, whisky sours, fly specks, cantaloupes, ice creams, welsh
rarebits, herringbones, chicken livers, goose gizzards, chocolate ants, kidney
stones, pig knuckles, flying farts, garbage trays, billard balls, dunce caps,
cutlasses, crabgrass, kangaroo tongues, belly-buttons, barber shears, window
ledges, tenthooks, slippery eels, toadstools, tradewinds, telephones, salesman,
climatizers, rapid transits, junk trucks, peters, pickles, pipes, peppers,
etc., etc., etc., . . .
When I read Literary Days at night I wake up in the
morning.
Ron
Padgett
1 comments:
☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS ☑️☑️
•• Are you Seeking for the Best Legit Professional Hackers online?
Congratulations Your search ends right here with us. •• ⚡️⚡️
☑️☑️For Years Now We have Been helping companies secure there Infrastructures against malicious Attacks, however private individuals have been making use of our services to provide Optimum solutions to their cyber and Hacking related Issues by providing them unlimited Access to their desired informations from their Target suck as Phone Hack (Which enables them to monitor their kids/wife/husband/boyfriend/girlfriend, by gaining access to everything they are doing on their phone without their notice), Credit Card Mishaps, Website Hacking, Funds Recoveries And Every Other Cyber Related Issues That has to Do With HACKING.
☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
We Are One Of The Leading Hack Teams In The United States With So Much Accolades From The Deep Web And IT Companies. ••
••We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.
☑️ Below Is A Full List Of Our Services:
▪️ FUNDS RECOVERY ON SCAM INVESTMENTS, BINARY OPTIONS TRADING and ALL TYPES OF SCAMS.
▪️ WEBSITE AND DATABASE HACKING ๐ป
▪️ CREDIT REPAIR. ๐ณ
▪️ PHONE HACKING & CLONING (giving you ๐ฑ Unnoticeable access to everything Happening on the Target’s Phone)
▪️ CLEARING OF CRIMINAL RECORDS ❌
▪️ SOCIAL MEDIA ACCOUNTS HACKING ๐ฑ
▪️RECOVERY OF DELETED FILES ๐ค
▪️LOCATION TRACKING ๐
▪️BITCOIN MINING ⛏ And lot More.
☑️We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ DAWID CZAGAN⭐️ JACK CABLE ⭐️ SEAN MELIA ⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.
☑️COMPOSITE CYBER SECURITY SPECIALISTS is available for customer care 24/7. Feel Free to Place your Requests.
☑️☑️CONTACT:
••• Email:
composite.cybersecurity@protonmail.com
๐2020 © composite cybersecurity specialists
๐Want faster service? Contact us!
๐All Rights Reserved ®️.
Post a Comment