Skip to main content

Coffee and Chemist

Coffee and Chemist


The proprietor of a coffee shop had been busy all day. Being Saturday, it was very crowded and the customers were just unending. He had been on his toes since morning.

Towards the evening, he felt a splitting headache surfacing. As the clock ticked away, his headache worsened. Unable to bear it, he stepped out of the shop leaving his staff to look after the sales.

He walked across the street to the Chemist, to buy himself a painkiller to relieve his headache. He swallowed the pill and felt relieved. He knew that in a few minutes he would feel better.

As he strolled out of the shop, he casually asked the salesgirl, "Where is Mr. Sharma (the Chemist)? He's not at the cash counter today!" The girl replied, "Sir, Mr. Sharma had a splitting headache and said he was going across to the coffee shop. He said a cup of hot coffee would relieve him of his headache."

The man's mouth went dry and he mumbled, "Oh! I see."

This is a typical case of looking outside ourselves for something that we have within us.
How strange but true!
The chemist relieves his headache by drinking coffee and the coffee shop owner finds relief in a pain relieving pill!

Debrief :-
A man hunts across the lengths and breadths of the universe to find peace.
Eventually he finds it in his heart and realizes that peace is really a state of mind.

#iamskm

Comments

Popular posts from this blog

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...

SAY NO TO SHYNESS !!!

13 Confident Ways to Overcome Your Shyness Those who have never suffered from shyness have no idea how debilitating it can be, especially for someone in a professional situation. If shyness is holding you back, learn how to get past it and become more confident. Shyness can truly hold people back --partly because those who are shy tend to avoid public situations and speaking up, and partly because they experience so much chronic anxiety. ⁣⁣ If that's you, take comfort in knowing you are far from alone--four out of 10 people consider themselves shy. But here's the good news: Shyness can be overcome. With time and effort and a desire to change, it's possible to break through. If your shyness is severe, you may need help from a therapist or counselor, but most people can overcome it on their own. Take your first steps in getting past shyness with these 13 techniques to help you become a more confident you. 1. Don't tell. There's no need to advertise your shyness. T...

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...