SlideShare a Scribd company logo
Don't compare yourself with any one in this world. If you compare, you are insulting yourself.
No one will manufacture a lock without a key. Similarly God won't give problems without solutions.
Life laughs at you when you are unhappy... Life smiles at you when  you are happy... Life salutes you when  you make others happy...
Every successful person has a painful story. Every painful story has a successful ending. Accept the pain and get ready for success.
Easy is to judge the mistakes of others. Difficult is to recognize our own mistakes. It is easier to protect your feet with slippers than to cover the earth with carpet.
No one can go back and change a bad beginning; But anyone can start now and create a successful ending.
If a problem can be solved, no need to worry about it. If a problem cannot be solved what is the use of worrying?
If you miss an opportunity don't fill the eyes with tears.   It will hide another better opportunity in front of you
"Changing the Face" can change nothing. But "Facing the Change" can change everything. Don't complain about others; Change yourself if you want peace.
Mistakes are painful when they happen. But year's later collection of mistakes is called experience, which leads to success.
Be bold when you loose and be calm when you win. Heated gold becomes ornament.  Beaten copper becomes wires.   Depleted  stone becomes statue.  So the more pain you get in life you become more valuable. JADA ‘08

More Related Content

More from Nafass

Persian New Year
Persian New YearPersian New Year
Persian New Year
Nafass
 
Learn to live
Learn to liveLearn to live
Learn to liveNafass
 
Venice Carnival 2010
Venice Carnival 2010Venice Carnival 2010
Venice Carnival 2010
Nafass
 
Akshaa&Khaateraat Ghadimi Jaaleb
Akshaa&Khaateraat Ghadimi JaalebAkshaa&Khaateraat Ghadimi Jaaleb
Akshaa&Khaateraat Ghadimi JaalebNafass
 
Un0 Emma Hack Peinturesurcorps
Un0 Emma Hack PeinturesurcorpsUn0 Emma Hack Peinturesurcorps
Un0 Emma Hack PeinturesurcorpsNafass
 
Onlyin Brazil
Onlyin BrazilOnlyin Brazil
Onlyin BrazilNafass
 
How2 Stay Young
How2 Stay YoungHow2 Stay Young
How2 Stay YoungNafass
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1Nafass
 
7 Do Nots After Meals
7 Do Nots After Meals7 Do Nots After Meals
7 Do Nots After MealsNafass
 
Iranianmaths
IranianmathsIranianmaths
IranianmathsNafass
 
Kandovan Hotel
Kandovan HotelKandovan Hotel
Kandovan HotelNafass
 
Cool On Xmas
Cool  On XmasCool  On Xmas
Cool On XmasNafass
 
Shahd Iran
Shahd IranShahd Iran
Shahd IranNafass
 
Dec20 Trouwtaarten In Kuwait Cs
Dec20 Trouwtaarten In Kuwait CsDec20 Trouwtaarten In Kuwait Cs
Dec20 Trouwtaarten In Kuwait CsNafass
 
Mystery Spain
Mystery SpainMystery Spain
Mystery SpainNafass
 
Astronaut Sunita Williams Picsof Earth
Astronaut Sunita Williams Picsof EarthAstronaut Sunita Williams Picsof Earth
Astronaut Sunita Williams Picsof EarthNafass
 
Squares
SquaresSquares
SquaresNafass
 
Borj Milad
Borj MiladBorj Milad
Borj MiladNafass
 

More from Nafass (20)

Persian New Year
Persian New YearPersian New Year
Persian New Year
 
Learn to live
Learn to liveLearn to live
Learn to live
 
Venice Carnival 2010
Venice Carnival 2010Venice Carnival 2010
Venice Carnival 2010
 
Akshaa&Khaateraat Ghadimi Jaaleb
Akshaa&Khaateraat Ghadimi JaalebAkshaa&Khaateraat Ghadimi Jaaleb
Akshaa&Khaateraat Ghadimi Jaaleb
 
Un0 Emma Hack Peinturesurcorps
Un0 Emma Hack PeinturesurcorpsUn0 Emma Hack Peinturesurcorps
Un0 Emma Hack Peinturesurcorps
 
Onlyin Brazil
Onlyin BrazilOnlyin Brazil
Onlyin Brazil
 
How2 Stay Young
How2 Stay YoungHow2 Stay Young
How2 Stay Young
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1
 
7 Do Nots After Meals
7 Do Nots After Meals7 Do Nots After Meals
7 Do Nots After Meals
 
Iranianmaths
IranianmathsIranianmaths
Iranianmaths
 
Kandovan Hotel
Kandovan HotelKandovan Hotel
Kandovan Hotel
 
Cool On Xmas
Cool  On XmasCool  On Xmas
Cool On Xmas
 
Shahd Iran
Shahd IranShahd Iran
Shahd Iran
 
Dec20 Trouwtaarten In Kuwait Cs
Dec20 Trouwtaarten In Kuwait CsDec20 Trouwtaarten In Kuwait Cs
Dec20 Trouwtaarten In Kuwait Cs
 
Mystery Spain
Mystery SpainMystery Spain
Mystery Spain
 
Shah
ShahShah
Shah
 
Astronaut Sunita Williams Picsof Earth
Astronaut Sunita Williams Picsof EarthAstronaut Sunita Williams Picsof Earth
Astronaut Sunita Williams Picsof Earth
 
Anaar
AnaarAnaar
Anaar
 
Squares
SquaresSquares
Squares
 
Borj Milad
Borj MiladBorj Milad
Borj Milad
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Personality Development Notes

  • 1. Don't compare yourself with any one in this world. If you compare, you are insulting yourself.
  • 2. No one will manufacture a lock without a key. Similarly God won't give problems without solutions.
  • 3. Life laughs at you when you are unhappy... Life smiles at you when you are happy... Life salutes you when you make others happy...
  • 4. Every successful person has a painful story. Every painful story has a successful ending. Accept the pain and get ready for success.
  • 5. Easy is to judge the mistakes of others. Difficult is to recognize our own mistakes. It is easier to protect your feet with slippers than to cover the earth with carpet.
  • 6. No one can go back and change a bad beginning; But anyone can start now and create a successful ending.
  • 7. If a problem can be solved, no need to worry about it. If a problem cannot be solved what is the use of worrying?
  • 8. If you miss an opportunity don't fill the eyes with tears.   It will hide another better opportunity in front of you
  • 9. "Changing the Face" can change nothing. But "Facing the Change" can change everything. Don't complain about others; Change yourself if you want peace.
  • 10. Mistakes are painful when they happen. But year's later collection of mistakes is called experience, which leads to success.
  • 11. Be bold when you loose and be calm when you win. Heated gold becomes ornament.  Beaten copper becomes wires.   Depleted stone becomes statue.  So the more pain you get in life you become more valuable. JADA ‘08