Skip to main content

Biography Muhammad Yunus (Inspiratif Story)

Over 30 years of struggle to alleviate poverty has now revealed the results. That picture of the struggle tirelessly committed Muhammad Yunus, an economics professor who later dedicated his life to establishing the bank to reduce poverty in the country, Bangladesh, the Grameen Bank or the name of the village bank.

Thanks to the tireless struggle and full of sincerity, he has been awarded the 2006 Nobel Peace Prize last year, although he is not a statesman or politician, as long as it dominates the Nobel laureate.

He got the award instead of trying to reconcile the war that raged in the world, but thanks to his struggle to win the battle against poverty.
Because, according to the Nobel prize-giving, sustainable peace can not be achieved unless large population to find a way to escape poverty, and that is what initiated since 1974 Jonah ago.

What has been achieved and proven by Muhammad Yunus in fact originated from the simple things, the desire to help a mother to mengentaskannya of poverty. It departs from its concern at the sight of the reality in the country where there are so many poor people threatened with starvation. At that time, he thought, to do something he can do as a fellow human being in order to prevent death, although only one single person.
Apparently, the mother of one, over time more and more mothers are financed by Jonah from the bank to borrow money at the campus where he teaches. He was able to convince the bank, that the villagers would be able to return the money borrowed. And sure enough, from one person who financed Jonah, thanks to perseverance and help assist them, the number continued to grow into the hundreds of people. Then, from a village grew into hundreds of villages. That is the origin of the bank about 25 years later, on October 2, 1983, became an independent statutory bank called Grameen Bank, which is a unique organization founded with the primary purpose of channeling microcredit to the poor in his country.
Since officially became a bank, with a philosophy that continues holding, which does not give a fish but gave to the poor fishing to find their own fish, Grameen Bank continues to grow. In about the year 2003, born June 28, 1940 Chittagong was then also developed a program for eliminating the life of a beggar with the program "The Struggling Members Program". Through the program, approximately 47 thousand more beggars in Bangladesh have helped. And thanks to the program, now thousands of beggars there has to be capable of independent small businesses, without begging for more. Tens of thousands of villages in Bangladesh is now also been cleared of Grameen bank. And, with thousands of employees, plus a variety of programs that directly impact on the community, the bank has grown and even able to provide loans up to billions of American dollars!
The story of Muhammad Yunus is a proof that devotion with sincerity that will provide amazing results. Muhammad Yunus is initially only a professor who wants to help a mother from the slump, are now able to give something far beyond what he imagined, to reduce poverty in his country and was awarded the prestigious Nobel Peace Prize in 2006.
What can we learn from this story of Muhammad Yunus? Start everything from simple, from the small, from what we can. Origin could benefit others, the impact will continue to spread and develop into the good that will continue to be great. Muhammad Yunus is an example of real and personal example of extraordinary. He can use his knowledge, empathy, and a great love of life to answer the needs of many people around with a simple solution at first.

Ref:
http://motivation.byethost9.com/archives/479

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...

Hack WiFi Account From Phishing Attack With WifiPhisher

WiFi Phishing Attack With WifiPhisher Tool  Wifiphisher   is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. From the victim's perspective, the attack makes use in three phases: 1. Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point's wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up ...