Starting point

It wasn’t initially going to be a novel.
I told people it was but that was too scary a place to begin at.
My original plan was to write a series of loosely connected short stories. I planned to take a minor character from the first story and use them as the protagonist of the second, someone from the second taking centre stage in the third, all the way through to the final story featuring the lead from the opening chapter again. It seemed like a good idea, a way of writing a longer story almost by stealth without the daunting prospect of having to plan and write a novel from scratch. After all, I was new at this game, not having attempted fiction in thirty years or so. Let’s not get ahead of ourselves.
So much for that plan.
The first short story worked out okay (email me if you’d like to read it) but I wasn’t happy with its pacing and, although some of the dialogue was fun, I didn’t find it that rewarding to write. I felt I had a lot to learn still, and needed some help. An attempt at the second was similarly frustrating: it was better but longer and again the pacing let it down. The third never got beyond a dozen pages before I realised I didn’t have a clue where it was going, even if it did start well.
And it felt like I was treading water, shying away from the real challenge.
So I parked the short story collection, for now at least (I still think it’s a cool idea) and started a few creative writing courses to try to learn more of the craft. My first was a one-day workshop with best selling novelist Kate Mosse at The Guardian,  the second was a more substantial twelve-week online course with Random House, and that’s where the story that would become my first novel started to take shape.


1 comment:

  1. πŸŽ†THE HACK GEEKSπŸŽ†

    Have you ever wondered if it's possible to hack things the way hackers do it in the movies.πŸ€”πŸ€”

     

             Yeah its possible!!!😁😁😁

    "AS LONG AS IT'S TECHNOLOGY, IT CAN BE HACKED"


    Hacking can easily be done by planting a computer virus or spyware(depending on what the hacker intend to do) in the targeted device.🀐🀐


        We at THE HACK GEEKS give you the best hacking service there ever is.πŸ‘ŒπŸ‘Œ

    We understand the Issues of scammers all over the internet and that's why we give you a solid prove of our services.


    We have got the top hackers in hackerone.com that are always ready to hack for you anytime ,anywhere, any device, organisation, federal agencies, university, college you just think of it.

     We can help:

    *To Hack, Clone or Track a Phone?πŸ“±πŸ“²

    *To Sniff, Erase or Change a file in a Company, Organisation or in a Federal agency?πŸ“–πŸ“ƒ

    Eg: Changing of grades in a university.

          Changing of identity.

          Deleting of files such as criminal records and evidence.

          Changing of files and evidence in federal facilities.

          Stealing of files and document from companies and organizations.

    *To retrieve lost BitCoinπŸ’°πŸ’°

    *Mining of BitCoinπŸ’°πŸ’°

    *To hack an Email or any Social Media account?πŸ’ž

    *To Transfer funds without been detected?πŸ’΄πŸ’΅πŸ’·

    *To increase your credit score?πŸ”πŸ”

    *To Hack Credit/Debit card?πŸ’³πŸ’³


       All these are what we can do for you.


    We are descrete and won't expose our service to you to anyone.

    Contact:

    thehackgeeks@gmail.com

    We look forward to hacking for you

    ReplyDelete