Stones

As I picked up some of the polished gemstones in the rock store I began to think about what the stones looked like before they were polished. The store had several rocks on display showing the before and after and I realized that unless you knew what you were looking for, you could easily pass by a valuable gemstone. I also thought about how many times we pass by someone because they look "ordinary" and what we might be missing because we don't get to know their "inner person". Thus this poem.

Stones

Like stones in a polisher
We are tossed to and fro,
bouncing off each other
while wearing off our rough edges.
Sometimes the sharpness may hurt others,
sometimes we are the ones being hurt,
but as our edges become smoother,
our surface becomes shinier.
What was once hidden
in plain grey rock begins to show
its true colours.
We may have paused to look
at our fellow tumblers
and dismissed some of them
because of the drabness of their coats.
But now they are the stones
that shine the brightest.

Think of the diamond.
It is just a simple crystal
until it is broken, cut and shaped
to reveal its inner brilliance.
We too are being tossed and turned
cut and shaped,
in order to reveal our brilliance.
God the master stone cutter
sees within our drab outer covering
to the hidden beauty within.
Thanks be to God.

Copyright February 2005

Fran Watson,
http://www.franwatson.ca,
http://www.franwatson.ca,
http://www.franwatson.ca

cleaning team near Winnetka ..
In The News:

Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.

A Hundred and Fifty Dead [Korean War--l952]

There I sat, ninety-five degree weatherOutside; the bookstore caf?, was... Read More

Two Poems with Triggers [and a commentary]

So Many Einstein'sThe morning mist, insists there is a God.... Read More

Choices

You can do and you can be whatever you want.... Read More

Ambiguity and Abstraction in Bob Dylan?s Lyrics

To many people contemporary poetry is a turn-off. The reason... Read More

Three Poems [Lima; Judges and Evils Creation]

1.Evil's CreationThou knowith evil clings To tender peace-; Nor does... Read More

It Was Not Me

It was not me as I am now. It was... Read More

Ballade of an Inca King

Ah! Leave the gold, wealth and landSays the Inca King?;... Read More

Five Mixed Poems, with Notes [now is Spanish and English]

1.Night in Jamaica [Peruvianism: 1810]It was a rainy night... Read More

The Time Has Come and Buzzing

Most of my poems are written late at night, often,... Read More

Mechanical Poetry - Part Three

Have you ever read the lyrics of a Simon and... Read More

To My Friend, With Love

All is still; all quiet; The world seems to... Read More

My hero, my best friend, my Grannio (a.k.a my Grandmother)

She raised me like I was her own daughter from... Read More

The Butcher of Lima and Footprints to Mantaro Valley (Two Poems)

Footprints to Mantaro Valley (Peru; in English and Spanish)In what... Read More

Infected Ideologies [a Poetic Portrait]

the disease of extremism is infectious-; whoever cannot think of... Read More

Birthday Messages

I WANTED TO SAY IT WITH A BUNCH OF FLOWERS... Read More

Opposites Do Attract Quite Well

When I am climbing up, you are stepping down. When... Read More

The Plane from Iquitos [1959-Part One]

Iquitos & the Amazon Part OneIt was December 2, l959,... Read More

I Saw the Universe

I can see the cerulean blue of the skiesOr the... Read More

THe Monster Mash, A Graveyard SMASH (short story I wrote when I was 11)

The Monster Mash The Graveyard SmashHave you heard of the... Read More

How to Write Bad Poetry

"All bad poetry springs from genuine feeling."--Oscar WildePeople write poetry... Read More

Thank You To Our Soldiers And A Tribute To Old Glory And A Prayer For Peace

Thank youDedicated to soldiers and their loved onesFor those who... Read More

Tale of the: Old Hunter and the Golden Hare [In SPANISH and English now]

There once lived an old man and his goodwife On... Read More

Review Of Stephen B. Wileys First Book Of Poetry: HERO ISLAND

Poet Stephen B. Wiley's first book of poetry, Hero Island,... Read More

Feelings, O How Glorious!

Sometimes we feel hard-pressed, Our backs against the wall;... Read More

Three Poems (While in Transition/English and Spanish)

Here are three more poems by the author, Dennis Siluk,... Read More

family-safe home cleaners Northbrook ..