wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Pilgrimage at LOC: A privilege and a paradox

profile
Navin Karpe
May 22, 2022
3 Likes
4 Discussions
164 Reads

Chicken, rice and the traditional saag were packed in our picnic baskets. It was a day-long trip – food wouldn’t be available on the way. We left our guesthouse in Reshwari and walked to the assembly point, 10 minutes away. Ours was the last pick-up.

We had registered for this trip the previous day by submitting our identity cards and photographs. A tourism officer and his wife were also visiting Reshwari. They had asked us if we would be interested in visiting the shrine of Peer Baba. We had just returned from the Amarnath yatra and weren’t really kicked about another religious trip so soon. 

However, this was a day-long trip. And saying no to a chance of visiting a place we’d never heard of is sacrilege. We agreed to join them on this “outing” to Peer Baba.

A “convoy” to visit Peer Baba’s shrine

Soon, a fleet of seven Tata Sumos arrived. Each jeep had a list of passengers put up on the front. We were supposed to sit in the jeep assigned to us. We were impressed with the management of the tour company in this small village of Reshwari in northern Kashmir. 

The assembly point turned out to be gates of the Indian Army post. We were greeted by an officer, dressed impeccably in his Indian Army uniform. It was our first time shaking hands with an officer on duty. He asked us all to be seated in the jeeps. “Trucks aate hi honge”, (Trucks will be here soon), he said.

We assumed the trucks would be carrying supplies for the villages near the Peer Baba shrine. Since it was such a remote place that access to basic necessities would be tough, we figured.

Instead, what arrived were two trucks of the Indian Army. The seven jeeps now also started moving ahead, led and trailed by these trucks! This wasn’t a group tour – this was a convoy!

 

 

 


Comments ()


Sign in

Read Next

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

NETWORK SECURITY RISKS

Blog banner

Health is Wealth

Blog banner

Password Generator - Lisp

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Memory Management

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Big Data Architecture

Blog banner

RAID

Blog banner

Fault Tolerance

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Memory Management in Operating System

Blog banner

How Cyber Forensics use in AI

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Metasploit

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Types Of Interrupt

Blog banner

Types of Hackers

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Record Blocking

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

NodeJs

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Process Creation

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Drawing tips for a beginner

Blog banner

Bit Coins

Blog banner

CONCURRENCY

Blog banner

File management in os

Blog banner

Multiprocessor scheduling

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

OS- Assignnment 1

Blog banner

Memory management

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner