Skip to main content

Let GOD

We crave acceptance, therefore criticism and judgement are hard on us mentally and emotionally. The fact is-it hurts. But confronting the criticism and judgement of other people becomes easier when you remember that ultimately it is before your own master you stand or fall. In the end you will answer to God alone.How can we succeed at what God has called us to if we are overly concerned about what other people think? 

If you get the idea in your head that everything concerning your life should always be perfect, you are setting yourself up for a fall. This is not to suggest that you should be negative. But you do need to be realistic enough to realize ahead of time that in fact very few things in life are ever perfect. Many people are hurting terribly and are crying out for help, but they aren't willing to receive the help that God has to offer. It is amazing how we often want things our way. When someone hurts you, you may feel they owe you something, yet Jesus wants you to let it go. 

No matter how much you may want his help, you will receive only when you are willing to do things God's way. As the blossom can't tell what becomes of it's fragrance, we can't tell what becomes of our influence. Every good gift and every blessing is from above, and comes down from the father of lights, with whom there is no variation or shadow of turning. So often people are afraid of brokenness. But if your outer man is broken, the powerful things inside you can pour forth. 

Stability is maturity. To grow up in God is to come to a place where you can be content no matter the situation because you are rooted and grounded, not in things, but in the Lord. Do you ever really get tired of doing the same old thing all the time? You want to do something different but you either don't know what to do or you are afraid of doing the new thing you think about doing? You do the same thing all the time even though you are bored with it because you are afraid  to step out and do something different. You would rather be safe and bored than excited and living on the edge. There is a certain amount of comfort in sameness - you may not like it, but you are familiar with it. I am not where I need to be but thank God I am not where I used to be. I'm okay and on my way.🔜😉🙇

Comments

Popular posts from this blog

Fun Terminal Commands Every Linux User Should Try

Accessing Maps from the terminal with MapSCII Requirements Telnet installed Internet Connection Firewall is disabled You can do this on Linux, Unix, Mac OS X or Windows with an app like PuTTY or the Windows 10 Linux bash shell or any Os that supports telnet. Open terminal and write the command below. telnet mapscii.me Hit enter and you're ready to browse and enjoy MapSCII. Navigate using the keyboard or mouse. Use the following keys on your keyboard Arrow keys: up, down, right, left A to zoom in Z to zoom out C toggles ASCII mode on/off You can also click and drag and hold on the map with your cursor. If your connection dropped without a reason, reconnect with telnet -E mapscii.me and use only cursors, A and Z to navigate. The Mapscii project is open source and you can install it locally if you'd like. Check out their project here on GitHub . The Dancing ASCII Party Parrot Requirements Curl installed Internet

SQL for Data Analysis - Udacity

  Entity Relationship Diagrams An  entity relationship diagram  (ERD) is a common way to view data in a database. Below is the ERD for the database we will use from Parch & Posey. These diagrams help you visualize the data you are analyzing including: The names of the tables. The columns in each table. The way the tables work together. You can think of each of the boxes below as a spreadsheet. What to Notice In the Parch & Posey database there are five tables (essentially 5 spreadsheets): web_events accounts orders sales_reps region You can think of each of these tables as an individual spreadsheet. Then the columns in each spreadsheet are listed below the table name. For example, the  region  table has two columns:  id  and  name . Alternatively the  web_events  table has four columns. The "crow's foot" that connects the tables together shows us how the columns in one table relate to the columns in another table. In this first lesson, you will be learning the bas

Impressive - Check if Your Email Address Has Been Hacked - Free,Easy Tutorial

haveibeenpwned.com Data breaches are rampant and many people don't appreciate the scale or frequency with which they occur. A "breach" is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. How is the legitimacy of a data breach established? Attackers often give "breach" announcements, which are later revealed to be hoaxes. There is a delicate balance to be struck between making data searchable as soon as possible and conducting proper due diligence to confirm the breach's validity. In order to verify the authenticity of a violation, the following steps are normally taken: Has the affected provider made a public statement about the security breach? Does the information stolen in the breach show up in a Google search (i.e., it was simply copied from another source)? Is the structure of the data consistent with what you'd expect to see in a breach? Have