wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

De-Coding Love

profile
Anup Katkar
Nov 29, 2017
0 Likes
0 Discussions
745 Reads
 
  • What is Love ?

In love,we say you are mine. Most of us take the word 'mine' too literally so much so that,we think that we own that person which gives rise to possessiveness or/and taking that person for granted.

Now lets burst the bubble.

We are not the owner(Lord/Universe) of that flower,we are just the gardener. Who has been appointed to take care of it and to let the flower blossom. As soon as we rest on our past laurels or hinder the growth of the flower;We are bound to be fired by the owner as we were appointed to do exactly the opposite.And soon will be replaced;keep that in mind while loving someone.

The Gardener can always be replaced if s/he is not doing the expected job :)

Now the question remains what should we derive happiness from ?

The very fact that we were designated to do that job,makes us special and we should derive happiness by guarding the flower by making it blossom and grow in all weathers. Gardener never asks for flowers which s/he helped to grow and protected;Gardener is happy with the growth & well being of flower itself -This is Love :)

  • How to Identify it ?

If you are ready to do anything (in a good way)to make his/her life better,even if no one (including him/her)knows about it. It is love,according to me. Love is about giving,[Seems like love] is about getting. If you have a feeling of giving then it is love.

Note-Make persons life better also mean helping that person to reach his/her best.

De-Coding Love  

Comments ()


Sign in

Read Next

How to setup a professional looking business account on Instagram?

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Race Condition

Blog banner

Have You Explored India Yet?

Blog banner

Cloud Computing

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Indian Culture and Tradition

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Importance of business process documentation

Blog banner

INTRODUCTION

Blog banner

What is thread and alse multithreading

Blog banner

Google App Engine

Blog banner

All you need to know about “On-page SEO”

Blog banner

Booting Process In Operating System

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Internet of Things and cyber security

Blog banner

Danger assessment in GIS

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Clarizen

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Life lesson

Blog banner

Article on Zoho Corporation

Blog banner

How to write a cover letter

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

OS Evolution Achievements

Blog banner

ADIDAS

Blog banner

A BLOG ON MYSQL

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

An Overivew Of Cache Memory

Blog banner

Landslide Hazard

Blog banner

Deadlock

Blog banner

Health and fitness

Blog banner

I Personally

Blog banner

OPERATING SYSTEM

Blog banner

The seven-step improvement process

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

What is a Malware ?

Blog banner