Skip to main content

Friendship

The holiest of all places on this earth is where an ancient hatred has become a present love. Men had buddies, women had friends. Buddies bonded but friends loved. Buddies faced adversity together but friends faced each other. Buddies seemed to do things together, friends simply were together. You don't show off to a friend, you show need. Buddies try to keep the worst from each other, friends confess it. Buddies seek approval but friends seek acceptance. A buddy is a fine-life companion but friends are that part of the race with which one can be human.

Apologies can be hard to make but it takes a spirit of humility to admit our mistake, which may not come naturally for us. But taking responsibility for how we were wrong in a situation can bring healing an restoration to a relationship.. Swallow your pride and make the first move. Even if you can't find a card to help you say it. 

Whenever you offend a friend, apologize and make things right. For if you will admit your wrong you may avoid a needless fight. The best way to get the last word is to apologize. Many times people form close relationship and depend on their friends to be there for them instead of looking to God. Even in the best relationships people will disappoint you because people are not perfect. It is right to love and respect others, but always remember that only God can be counted on not to fail you. LOVE man TRUST God. 

Trust is not inherited, it is learned. It is like a chain. Each link takes time to gain. With every true friend the chain gets longer. But only you can truly make it stronger. One weak link and the whole chain can be torn apart. To pick a strong link you must trust your heart. You can't let one person break you down because true trust can be found. It requires you to place your time in God's hands believing His timing is perfect for all things in your life. It means not knowing how God is going to accomplish something and not knowing when He will do it.

You may be deceived if you trust too much but you will live in torment unless you trust enough. It is the simplest way out. The best thing about friendship is that it isn't about age or looks or even shared commonalities but instead its about hearts that understand we are all one and the same. The way to have friends is to be one because anyway the living need more love than the dead.

We all want the best of friends, perfect allies, people who can stand by us and live in our memories, who can shine in our eyes then dwell in our hearts. Remember you show love in everything you do. Care for them in so many ways. Embrace their differences and when they need you be there for them. Sweet words are easy to say but good friends are hard to find.

A true friendship is one you simply can't measure. It comes from a place deep inside. A place that harbours dignity, pride and honesty. A place where you laughed, cried and where there is no room for lies. A place to go back to when feeling a bit down, a place where there's peace when there's chaos around. A place to hold on to when life rattles you a bit, to be secure and endure and not quit. A place to remember all the talks you shared, to hold onto because you know someone cared. A place where there's feelings, emotions and truth that you hope you will never loose.

But I understand times have changed and as for my friends, I am proud of them as I can be. They may never know how much they mean to me but my love does not sway. It only grows stronger each passing day.

Thanks for stopping by...!!!
Shop My Merch ^_^

Comments

Popular posts from this blog

Fun Terminal Commands Every Linux User Should Try

Accessing Maps from the terminal with MapSCII Requirements Telnet installed Internet Connection Firewall is disabled You can do this on Linux, Unix, Mac OS X or Windows with an app like PuTTY or the Windows 10 Linux bash shell or any Os that supports telnet. Open terminal and write the command below. telnet mapscii.me Hit enter and you're ready to browse and enjoy MapSCII. Navigate using the keyboard or mouse. Use the following keys on your keyboard Arrow keys: up, down, right, left A to zoom in Z to zoom out C toggles ASCII mode on/off You can also click and drag and hold on the map with your cursor. If your connection dropped without a reason, reconnect with telnet -E mapscii.me and use only cursors, A and Z to navigate. The Mapscii project is open source and you can install it locally if you'd like. Check out their project here on GitHub . The Dancing ASCII Party Parrot Requirements Curl installed Internet

SQL for Data Analysis - Udacity

  Entity Relationship Diagrams An  entity relationship diagram  (ERD) is a common way to view data in a database. Below is the ERD for the database we will use from Parch & Posey. These diagrams help you visualize the data you are analyzing including: The names of the tables. The columns in each table. The way the tables work together. You can think of each of the boxes below as a spreadsheet. What to Notice In the Parch & Posey database there are five tables (essentially 5 spreadsheets): web_events accounts orders sales_reps region You can think of each of these tables as an individual spreadsheet. Then the columns in each spreadsheet are listed below the table name. For example, the  region  table has two columns:  id  and  name . Alternatively the  web_events  table has four columns. The "crow's foot" that connects the tables together shows us how the columns in one table relate to the columns in another table. In this first lesson, you will be learning the bas

Impressive - Check if Your Email Address Has Been Hacked - Free,Easy Tutorial

haveibeenpwned.com Data breaches are rampant and many people don't appreciate the scale or frequency with which they occur. A "breach" is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. How is the legitimacy of a data breach established? Attackers often give "breach" announcements, which are later revealed to be hoaxes. There is a delicate balance to be struck between making data searchable as soon as possible and conducting proper due diligence to confirm the breach's validity. In order to verify the authenticity of a violation, the following steps are normally taken: Has the affected provider made a public statement about the security breach? Does the information stolen in the breach show up in a Google search (i.e., it was simply copied from another source)? Is the structure of the data consistent with what you'd expect to see in a breach? Have