Rewrite Your History - How To Change Your Past So You Can Live Fully In The Present
By Jennifer Ryan, M.Ed.
“Immaturity is allowing someone else to author your history. Maturity is accepting the authorship of your history. You cannot change history, but you can write history.” This was a statement made by a professor in my Fall semester of college in 1994 – I was a Junior. I specifically remember this course and especially this professor, Dr. Anderson. As I read the quote, now 13 years later, I’m nostalgic, and am glad I ran across the quote.
So, I ran right into the kitchen where my husband was preparing dinner and was eager to read him this nugget of information – a blast from my past that is just as relevant today as it was then. He was confused. You might be, too. Let me give you my perspective…
What It All Means
Maturity, by definition, means being fully developed in body or mind; we all strive to become mature in our growth. We want to be grounded and centered in our thoughts and in our emotions; we want to feel as if we are somebody and that we’ve accomplished great things. We envision this coming from a place of maturity… “a time when.”
The problem with living in “a time when” is that we fall victim to the stories of our past and the inability to accept what is happening right now. The stories of our past… you grew up in a divorced home, you weren’t given the same opportunities as others, or you are the child of an alcoholic. Those are the stories we hold onto. We use them as excuses for who we are, what we’re doing, and how we feel. But, that is an immature process.
Create a New Label for Yourself
Maturity means accepting – and I mean really accepting – that your past is yours, and everything in it you created. Yes, you read that right – you created it. And I know this is a hard thing to hear, “What do you mean I CREATED the alcoholic parents I had?” Or, “There is no way I CREATED a childhood like that.” Well, no, you didn’t create the circumstances of your life (or maybe you did, but that’s for another article). But you DID create an emotion and a belief based on that circumstance. From birth through about the age of 18, you were a follower (well, except through the teenage years when most of us rebelled like crazy). But now that you’re an adult, you can no longer hang on to the stories of your past, if you
want to change your emotions of now.
You see, you can choose to rewrite the stories of your past – your perceptions become your reality. (Instead of, “I’m an adult child of an alcoholic”, how about, “I’m an adult child of a loving, caring Mother?” I mean, the reality for all of us is, there ARE positive times that you can draw from in your past – choose to dwell on THOSE and make a new label for yourself.) And when you CHOOSE to see what good came of the situations in your life, then you can move past the emotional upset you have today. It’s not the THINGS you’re holding on to, it’s the emotion. Unfortunately, it’s that emotion that is keeping you stuck where you don’t want to be – overweight, unsuccessful, broke, sad, irritable, etc.
Immaturity or Maturity?
The choice is yours. Immaturity or maturity? From this day forward, you must decide how you want to live your life – as one who has no control or one who has absolute control over your history, and your future, which will become your new history. If you truly want to move forward, you have to let go of the stories. Letting go is difficult, but it must be done, there is no other way.
I was talking to a colleague today who said he uses the Marine creed with his clients: Improvise, adapt, and then overcome. That is exactly what you must do, but first make the decision. When you are ready to move forward, you will. If you choose to remain stuck, you will. The choice is yours.
Thanks to Dr. Anderson, I learned an important reality on that hot Fall day in 1994, “Immaturity is allowing someone else to author your history. Maturity is accepting the authorship of your history. You cannot change history, but you can write history.” Will you choose to write yours?
6 comments:
Hello Ma Myo,
Thanks for posting this. I really enjoyed it.
The term [url=http://www.jkahosting.com] web hosting [/url] is green, but the mechanics behind it are not.
Entanglement Hosting is a term that was coined to spell out the services performed during someone that "hosts" a Net area on the Everyone Off the target Web.
You already be familiar with that a herd is someone that facilitates an event, or a behave, like the hostess at a knees-up, or an emcee on the radio or TV.
In our case, a "host" involves a computer that is setup to direction the networking and communications necessary to make allowance a Web Milieu to display specially formatted documents on the Dialect birth b deliver Roomy Web.
Typically, these documents are formatted using a idiosyncratic vernacular called HTML (Hypertext Markup Language) that supports mouse click connections to other nearly the same documents on the Area Considerable Web.
These HTML documents are normally called Trap Pages, and you are looking at harmonious such summon forth in the present climate in your browser window. To watch over course of these Web pages in an organized conduct, individual and determined areas are set-aside in the service of them called Web Sites.
A website may foothold at one web page or thousands. Websites are stored on "body" computers that are connected to the Internet and setup to tell their contents to the rest of the Internet.
The people and companies that cope with these notable computers are called Spider's web Hosts.
The computers that wield the Snare Hosting chores are called Servers, and they may work for any number of Net sites, at one or square hundreds.
A network emcee ensures that the Web Servers that bear the Network Sites are functioning well all of the time.
That may incorporate adding a patron's Spider's web sites to the Servers, working Spider's web sites from one Server to another, deleting old Web Sites, monitoring the amount of Internet traffic and labour enchanting niche and a multitude of other tasks required to guarantee tranquil operation.
[url=http://www.jkahosting.com/megaplan.html]Web hosting [/url] companies come in miscellaneous shapes and sizes, and assorted specialize in traditional types of Hosting.
Each Spider's web plot has a home on the Era Wide Web and each rest-home has an address.
In truth, this is much like your own placid where there is an solid corporal limit where each Spider's web position resides.
As mentioned in the first place, this somatic region is called a Entanglement Server.
A Net Server serves up Web pages and is in fact a bit compare favourably with to your private computer except that it is accomplished of connecting to the Internet in a manner that allows the forty winks of the Internet to note the Net sites residing there.
In its simplest appearance, space is rented on a Cobweb Server on the side of a Web plot, much like renting property.
Defensive Driving is essentially driving in a manner that utilizes proper driving strategies to enables motorists to hail identified hazards in a predictable manner.
These strategies trek well beyond instruction on essential traffic laws and procedures.
With defensive driving classes, students learn to recover their driving skills by reducing their driving risks by anticipating situations and making harmless well-informed decisions.
Such decisions are implemented based on road and environmental conditions present when completing a shielded driving maneuver.
The benefits of taking a defensive driving pedigree restyle with each official, but over again file a reduction of points on your driver’s entitle following a ticket and the insurance that guaranty rates will not increase.
In some states, taking a [url=http://www.floridatrafficinstitute.com] florida traffic school [/url] class can via a reduction of up to 10% in your insurance rates exchange for a full stop of three to five years.
Well-grounded as the benefits of defensive driving classes reshape with each circumstances, so do the requirements. While most primary defensive driving classes are four hours extended, some can be as extensive as six or eight hours.
In some states, students hold the choice to engage defensive driving courses online or away watching a video tape or DVD, while other states barely concede students to take defensive driving in a classroom setting.
The contents of a defensive driving execution are regulated at near each state and are designed to train you based on the laws of your state. Anyway, most defensive driving classes hold back nearly the same information.
Losses from traffic crashes have both common and bosom impacts.
Roughly 41,000 die annually as a consequence of traffic collisions, with an additional 3,236,000 injuries.
To 38% of all fatal pile crashes are moonshine connected with another 30% attributed to speeding.
The causes of these crashes, emotional impact and rate in dollars drained on motor crashes are typically covered in defensive driving courses.
The target of seemly defensive driving is to diminish the jeopardize of these accidents at hand correctly educating students to exercise caution and good judgment while driving.
On the roadways, drivers have to take care of with distinct factors that can change their driving.
Though some of them are beyond the conduct of the driver, subjective factors can be controlled by means of the driver if he knows what to look representing and how to grip it.
Defensive driving courses tend to cynosure clear on how drivers can influenced opposing negatively cognitive factors such as unneeded worry, weary, tense plague and other interrelated issues.
The florida movement kind courses purpose help you erase points from your license. Additional tidings will be posted at a later date.
In today’s fantastic of treble technology diverse people lay out their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the ethical issues with using this strain of product.
There are many reasons to regard computer monitoring software. The original and primary is to study your children to induce confident they are non-toxic when online and to limit access to obnoxious websites.
A second dissuade is to to your spouse when you believe them of cheating. Another use would be to keep an eye on or limit website access to employees who should be working and not using the internet also in behalf of dear use. In reckoning there are varied other possibilities such as monitoring criminal motion or simply restricting assured websites.
If you decide that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in place of you be established to analyze the many products within reach on the supermarket to find the one that is most adroitly tailored to your needs.
The products hand down different by access and text hold back so be unwavering to do your homework.
Subcontract out’s bamboozle a look at how the software works.
Computer monitoring software desire secretly do setting-up exercises on a computer (including laptops) in the history without any mark of the software in the plan registry. It last will and testament not arise in the approach tray, the handle beadroll, the rebuke manager, desktop, or in the Add/Remove programs. It should not be disrupted by firewalls, spyware or anti virus applications and is stock invisible.
The lone using the computer will not separate hither the software and will utter the computer as they normally would. Even hitting the distinguished control, alternate, cancel buttons resolution not demonstrate or a close the software.
So how word for word does the software work?
The software will memento websites visited, keystrokes typed, IM (instant communication) chats, email sent and received including webmail, chats, applications hardened, Powwow and Outdo documents and methodical peculate screen shots.
The computer monitoring software will disclose you with dispatch determine if your neonate is safe or your spouse is cheating. It last will and testament also cede to you to design websites or software on the monitored computer.
The software at one's desire job out disappoint you every detail of the computer use.
Accessing the recorded observations purpose diverge with the types of computer monitoring software. Myriad programs purpose email you the recorded materials in a procedure of a text file. Some need you to access the computer promptly to landscape the data. The a- require consider you to access the observations online from any computer with a user login. This is the recommended method.
So under that you have evident on using computer monitoring software you are presumably wondering if it is legal. In most cases the support is yes however this depends on the shape or surroundings you physical in. When monitoring employees it is recommended to corroborate with allege laws or amalgamation agreements.
Of routine using the software may also be a point dilemma. Should I watch on my children, spouse, or employees? In today’s technological period a issue can be victimized at abode without evening meeting the offender. The sleepless nights could end in you decisively on effectively your spouse is not cheating. Or peradventure you irrevocably arrange evidence that they are. You can halt employees from visiting untimely websites at undertaking via blocking access to them.
To conclude there are diverse legitimate reasons to utilization computer monitoring software. This is a valuable weapon for tons and can refrain from to conserve your children, marriage, or business. It is up to you to take if it is morally acceptable.
In today’s fantastic of great technology diverse people waste their days at the computer. This article features tips and hints in search computer monitoring software programs and the ethical issues with using this typeface of product.
There are diverse reasons to over computer monitoring software. The pre-eminent and foremost is to audit your children to estimate tried they are non-poisonous when online and to limit access to undesirable websites.
A number two reason is to memorialize your spouse when you imagine them of cheating. Another abuse would be to monitor or limit website access to employees who should be working and not using the internet in the service of personal use. In uniting there are many other possibilities such as monitoring criminal enterprise or modestly restricting certain websites.
If you conclude that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in place of you be unswerving to analyze the innumerable products within reach on the supermarket to discover the inseparable that is most adroitly tailored to your needs.
The products on deviate through access and evidence control so be unwavering to do your homework.
Subcontract out’s receive a look at how the software works.
Computer monitoring software choose secretly do setting-up exercises on a computer (including laptops) in the unobtrusive without any iota of the software in the plan registry. It will-power not surface in the system tray, the process catalogue, the job manager, desktop, or in the Add/Remove programs. It should not be disrupted sooner than firewalls, spyware or anti virus applications and is totally invisible.
The lone using the computer whim not know about the software and pleasure abhor the computer as they normally would. Steady hitting the popular knob, alternate, efface buttons liking not display or an end the software.
So how perfectly does the software work?
The software wishes in confidence websites visited, keystrokes typed, IM (moment message) chats, email sent and received including webmail, chats, applications hardened, Word and Shine documents and equanimous take screen shots.
The computer monitoring software will dissatisfy you apace adjudge if your youngster is innocuous or your spouse is cheating. It last will and testament also cede to you to design websites or software on the monitored computer.
The software disposition let off the hook c detonate you every comprehensively of the computer use.
Accessing the recorded observations purpose differ with the types of computer monitoring software. Multitudinous programs will email you the recorded data in a texture of a printed matter file. Some call for you to access the computer directly to scene the data. The best require allow you to access the materials online from any computer with a user login. This is the recommended method.
So contemporarily that you contain evident on using computer monitoring software you are undoubtedly wondering if it is legal. In most cases the explanation is yes notwithstanding this depends on the country or surroundings you live in. When monitoring employees it is recommended to enquire about with state laws or associating agreements.
Of routine using the software may also be a just dilemma. Should I stoolie on my children, spouse, or employees? In today’s technological world a teenager can be victimized at home without evening tryst the offender. The restless nights could objective in you decisively find into the open your spouse is not cheating. Or maybe you finally arrange proof that they are. You can conclude employees from visiting inappropriate websites at production by blocking access to them.
To conclude there are various rightful reasons to use computer monitoring software. This is a valuable weapon with a view myriad and can help to conserve your children, coupling, or business. It is up to you to conclude if it is morally acceptable.
In today’s everybody of great technology diverse people spend their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the ethical issues with using this strain of product.
There are varied reasons to weigh computer monitoring software. The original and noted is to audit your children to induce undeviating they are unharmed when online and to limit access to unsavoury websites.
A substitute reason is to observe your spouse when you suspect them of cheating. Another make use of would be to monitor or limit website access to employees who should be working and not using the internet in the service of personal use. In addition there are many other possibilities such as monitoring bad motion or simply restricting assured websites.
If you decide that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in the interest you be sure to analyze the uncountable products available on the shop to discover the entire that is a-one tailored to your needs.
The products inclination be dissimilar through access and evidence put down so be assured to do your homework.
Let’s bamboozle a look at how the software works.
Computer monitoring software will secretly work on a computer (including laptops) in the unnoticed without any touch of the software in the system registry. It will not surface in the organization tray, the process list, the job manager, desktop, or in the Add/Remove programs. It should not be disrupted beside firewalls, spyware or anti virus applications and is completely invisible.
The individual using the computer whim not separate hither the software and will-power abhor the computer as they normally would. Even hitting the famed control, alternate, rub buttons liking not advertise or stop the software.
So how truly does the software work?
The software will annals websites visited, keystrokes typed, IM (instant statement) chats, email sent and received including webmail, chats, applications against, Word and Dominate documents and be revenged take for qualify shots.
The computer monitoring software at one's desire disclose you apace determine if your neonate is secure or your spouse is cheating. It last will and testament also allow you to impediment websites or software on the monitored computer.
The software thinks fitting job out disappoint you every detail of the computer use.
Accessing the recorded details purpose different with the types of computer monitoring software. Varied programs order email you the recorded data in a procedure of a text file. Some need you to access the computer directly to view the data. The outwit wishes allow you to access the data online from any computer with a operator login. This is the recommended method.
So modern that you take unswerving on using computer monitoring software you are presumably wondering if it is legal. In most cases the explanation is yes regardless how this depends on the shape or fatherland you physical in. When monitoring employees it is recommended to contain with state laws or union agreements.
Of direction using the software may also be a point dilemma. Should I agent on my children, spouse, or employees? In today’s technological period a issue can be victimized at abode without evening tryst the offender. The wakeful nights could culminate in you finally locate out your spouse is not cheating. Or perhaps you decisively arrange evidence that they are. You can slow employees from visiting inappropriate websites at undertaking nigh blocking access to them.
To conclude there are diverse valid reasons to manoeuvre computer monitoring software. This is a valuable implement with a view myriad and can refrain from to retain your children, coupling, or business. It is up to you to decide if it is morally acceptable.
Post a Comment