Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
As We Forgive: Stories of Reconciliation from Rwanda

Buy
Inspired by the award-winning film of the same name.

If you were told that a murderer was to be released into your neighborhood, how would you feel? But what if it weren’t only one, but thousands?

Could there be a common roadmap to reconciliation? Could there be a shared future after unthinkable evil? If forgiveness is possible after the slaughter of nearly a million in a hundred days in Rwanda, then today, more than ever, we owe it to humanity to explore how one country is addressing perceptual, social-psychological, and spiritual dimensions to achieve a more lasting peace. If forgiveness is possible after genocide, then perhaps there is hope for the comparably smaller rifts that plague our relationships, our communities, and our nation.

Based on personal interviews and thorough research, As We Forgive returns to the boundary lines of genocide’s wounds and traces the route of reconciliation in the lives of Rwandans—victims, widows, orphans, and perpetrators—whose past and future intersect. We find in these stories how suffering, memory, and identity set up roadblocks to forgiveness, while mediation, truth-telling, restitution, and interdependence create bridges to healing.

As We Forgive explores the pain, the mystery, and the hope through seven compelling stories of those who have made this journey toward reconciliation. The result is a narrative that breathes with humanity and is as haunting as it is hopeful.

About the Author

Catherine Claire Larson is a senior writer and editor of Prison Fellowship and BreakPoint. With a bachelor's degree in English and a master's degree in theological studies, Larson hopes to give voice to Rwandans who are involved in one of the most closely watched experiments in forgiveness in our world today.
(HTML tags aren't allowed.)

3D Printing for Architects with MakerBot
3D Printing for Architects with MakerBot

Learn how to create successful 3D architectural models that you can print out with MakerBot Replicator 2X. It brings an extra dimension to your presentations and distinguishes your practice from the rest.

Overview

  • Intelligently design a model to be printed on the MakerBot from the scratch
  • ...
90 Days to Success in Consulting
90 Days to Success in Consulting
In college, when I was working my first consulting job, a professor called with a problem with a slow computer. He had tried everything he knew to fix the problem, to no avail. The computer used to have good performance, but something had happened. Upon arriving at his office, it didn’t take me long to spot the problem....
Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...


WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Highly regarded as the book on the air interface of 3G cellular systems WCDMA for UMTS has again been fully revised and updated. The third edition now covers the key features of 3GPP Release 6 ensuring it remains the leading principal resource in this constantly progressing area.

By providing a deep understanding of the...

Handbook of Computer Vision and Applications, Volume 2
Handbook of Computer Vision and Applications, Volume 2

This handbook o ers a fresh approach to computer vision. The whole vision process from image formation to measuring, recognition, or reacting is regarded as an integral process. Computer vision is understood as the host of techniques to acquire, process, analyze, and understand complex higher-dimensional data from our environment for scienti...

Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy