Thứ Tư, 5 tháng 4, 2017

Youtube daily Apr 6 2017

JOURNALIST MIKE "THE

STICK" SIMS

SHOWS US WHAT HE FOUND.

>> THIS TOURNAMENT IS THE

LARGEST INDEPENDENT TOURNAMENT

IN THE COUNTRY.

PLAYERS FROM ALL OVER THE STATE,

NEBRASKA, ILLINOIS.

>> ON THE CURRENT PRESIDENT OF

THE IOWA STATE POOL PLAYERS

ASSOCIATION.

THERE ARE, I BELIEVE, 4300

RESERVATIONS FOR THIS WEEK.

WE'LL HAVE JUNIOR TOURNAMENT

ENTRIES AS YOUNG AS

EIGHT-YEAR-OLD.

WE'VE GOT PLAYERS WELL INTO

THEIR 80'S.

YOU HAVE TO THE PLATE SIX WEEKS

IN A SECTION ME.

POOL IS A GAME THAT CAN BE

PLAYED ON ANY LEVEL.

IF YOUR BANK PLAYING SOMEONE --

IF YOU'RE PLAYING SOMEONE

SLIGHTLY DIFFERENT FROM YOUR

LEVEL, IT'S FUN.

For more infomation >> Iowa's best 'hustle' at state pool tournament - Duration: 1:07.

-------------------------------------------

Will Quantum Computers break encryption? - Duration: 15:45.

The security of the internet depends on encryption.

It allows your device and a faraway server to send private messages to each other

like your emails, your passwords, pictures of your cats, without anyone eavesdropping.

Today's encryption works pretty well, but a sophisticated quantum computer can break it,

and a universal quantum computing machine is likely to emerge in the near future.

"But quantum computers are already here…"

Yeah yeah I know, there are quantum computers on the market, but these are not the scary ones.

They use quantum annealing to solve certain optimisation problems.

They are not the full-blown quantum computers that threaten our security.

They are too highly specialized for that.

But when the general-purpose quantum computers come…

Are we DOOMED???

Maybe… but we can fight quantum with quantum.

For the moment, forget about encryption and just think about what it's trying to achieve.

You and a server need to communicate with each other.

(And by "you", I mean "your computer".)

They need to be able to see the information you send them, and you need to be able to

see the information they send you.

No one else should be able to see any of these messages.

But what's stopping an eavesdropper from taking your messages

and making copies for themselves?

Not much.

So what if you scramble your messages?

Write them in a secret code.

Okay, then how are you and the server supposed to unscramble each other's messages?

If you tell each other how to unscramble them, then the eavesdropper knows

how to unscramble them too, and all of this is pointless.

You and the server need to know something that no one else does.

Ok let's give that a go.

Let's say that we scramble our data and incorporate a special number into the exact

way that we scramble it.

We do this in a way that you need that special number in order to unscramble it afterward.

Since this number is used to "lock" and "unlock" the data, let's call it a "key".

This key is a secret so we can't pass it through the internet for eavesdroppers to see.

Otherwise, they would be able to unscramble our messages.

But what about you and the server?

Without access to each other's key, how are you supposed to

unscramble each other's messages?

Here's how we get around this problem today.

Say that you want to send the server some private information.

The server has two special keys.

The public key can only be used to scramble information, no unscrambling.

So it's safe to send you that key, so you can scramble your secrets

before you send them along.

Even if the eavesdropper makes their own copy of the public key,

it's useless against a scrambled message.

So how does the server unscramble it?

It uses the private key.

This key is super-secret and no one but the server should ever have it, not even you.

This private key was custom-made to unscramble messages

which this particular public key scrambled.

These keys always come it pairs.

One of them can only scramble, and the other can only unscramble messages

that were scrambled by the first one.

Now, calling both these numbers "keys" might be a bad analogy, since keys can typically

both lock and unlock.

That's why I'm illustrating them as a padlock and a padlock key, since padlocks

can only lock, and its corresponding key can only unlock

that specific padlock.

And even this might be a bad analogy, since locking and unlocking messages

makes it seem like they're concealed inside a box or something,

when it's really more like blending it into something that looks meaningless,

but in such a way that the original message can be reconstructed if you have the right number.

Anyway, I'm stealing the padlock analogy from this numberphile video,

which goes into a bit more detail on how all of this works.

The short version is: Because math!

So that covers how you can send the server secret information.

How does the server send you secret information?

You don't have the server's private key, so you can't unscramble messages that were

scrambled by its public key.

Instead, you generate your own unique, plain old, regular key on the spot

and send theserver a copy.

But, before you send the key through, you use the server's public key to scramble it.

The server can then get your key by unscrambling it.

Now you each of you can use this new key to both scramble and unscramble messages.

Even better, the eavesdroppers can't get this new key, since it was scrambled when

you sent it to the server.

Hooray it worked!

Now here's the problem.

Everything here rests on the fact that keys that can unlock messages are kept secret.

We only share them secretly in scrambled form if we ever need to.

But we are freely sharing the public key.

It turns out that given enough time, an eavesdropper's computer can analyse it

to create an exact copy of the corresponding private key.

They can essentially pick the lock.

This is done by guessing tons of potential private keys until a match is found.

There are some shortcuts, but the math behind these keys is designed

so that this would take forever anyway.

Luckily, we change our locks faster the than the eavesdropper can pick them.

The fastest algorithms for doing this key reconstruction are just too slow

to be of any practical use.

So the eavesdropper won't find your private key unless you're astronomically unlucky.

There are theoretically faster algorithms that would do the job though.

But luckily they can only run on quantum computers.

Wait a minute, those are probably coming soon aren't they?

So, once again…

Are we DOOMED???

Possibly not.

There is an initiative to create new encryption standards

in a world after quantum computers become a thing: Post-Quantum Cryptography.

Here's the basic idea.

Public-private keys must behave as one-way functions.

Given a private key, it's easy to create its corresponding public key,

but given a public key, it's hard to create its corresponding private key.

It's a real pain to go backwards, hence it is one-way.

By design, at least one of these processes should be easy,

otherwise we wouldn't be able to create these key pairs in the first place.

After all, what's the point of designing the perfect padlock with no way to open it,

or the perfect padlock key with nothing for it to open?

Making this process easy ensures that we can always make a useful pair.

The hard part here is the critical point of this mechanism.

This makes it possible to let everybody encrypt messages but only some people decrypt them.

You can't decrypt messages without the private key, and it's hard to get it,

even when you have the public key.

And that is next to impossible in practice.

You might be wondering why we can't just make it impossible to go backwards.

It's because there will always be at least one way to get the private key from the public key:

going through every single possibility until a match is found.

The best thing that we can do is make the backwards process as hard as we can,

while keeping the forward process easy.

This is how one-way functions work, and they're the best thing we have so far.

Unfortunately, the particular one-way function that most of the internet uses can be broken

by quantum computers.

They make it easy to get the private key, but only because there happens to be algorithm

to do it that performs very well when it's run on a quantum computer.

To solve this problem with existing technology, new mechanisms could be built on different

one-way functions, particularly ones that no one knows how to break

even with quantum computers.

That would keep this process easy, this process hard.

This is good in the shorter term, but we can do better.

Surprisingly, quantum computers themselves come to save the day.

They can let us do things with security that not even public-private keys can do.

Welcome to Quantum Cryptography.

Conventional computers use bits which can each be either 1 or 0.

Quantum computers use qubits, which can be 1 or 0 or some combination of the two.

Let's visually represent qubits with this diagram, which I like to call the Bloch circle.

It's a simplified version of something else called the Bloch sphere,

but we don't need it for this video.

Now, in the Bloch circle, the direction that this arrow is pointing represents the state the qubit is in.

When we try to read a qubit, we need to choose a direction to measure it in.

If we measure it in the vertical orientation, we'll say that it's a zero whenever the

arrow points this way, and a 1 whenever the arrow points this way.

If the qubit was in some non-vertical state, our measurement forces the qubit to choose

one of them, ...because quantum mechanics!

If it was in a horizontal state, there's a 50-50 chance of it being measured as 0 or 1.

But if we wanted, we could have measured it horizontally.

In this case, this would be a 0, this would be a 1, and

these would be 50-50 chances.

But what's the point of leaving it up to chance anyway?

Why not just measure vertically when it's vertical, and horizontally when it's horizontal?

Because we can't know if a given qubit is vertical or horizontal,

unless we made it ourselves. ourselves.

The only way for us to learn anything about it is to measure it, but the harsh reality

is that measurement might have changed it to something else.

Because quantum mechanics!

Now all of this might look really useless at first, but we can actually use these qubits

to generate keys and actually detect if someone is trying to eavesdrop.

Here's how it could work.

The server generates a random string of 1s and 0s.

We're gonna use these ones and zeros to make a key.

The server encodes these bits into qubits

by randomly choosing a vertical or horizontal orientation.

These qubits are then sent down a line that supports transmission of qubits, and you receive them.

Now, you don't know which qubits are vertical and which are horizontal, so you randomly guess,

measuring some of them vertically and others horizontally.

Each time, you have a 50-50 chance of guessing right since there are only two possible orientations

and you have to pick one of them.

If you do guess right, that bit will be the same for you as it is for the server.

If you guess wrong, that bit has at risk of being wrong.

Now, you have your own random string of 1s and 0s, but it's not exactly the same as

the server's string because of your wrong guesses.

To throw out the useless bits, you and the server compare the orientations

you used for each bit, and throw out the mismatches.

Even if an eavesdropper drops in to peek at the orientations used to make the measurements,

they won't know what the measurements were.

Now, you and the server each have copies of the same key

that you can both use to scramble and unscramble messages.

But why did the server make you guess what the orientations were?

Why couldn't the server just give them to you so you wouldn't need to guess?

Because it would have given away too much information for eavesdroppers looking at our qubits.

If you can perfectly guess the server's bits, so can an eavesdropper.

But adding a little uncertainty trips them up.

Let's see how it plays out.

Once again, the server generates a random bit sequence and encodes it in random orientations.

Now the server sends you the qubits, but the eavesdropper catches them along the way.

The eavesdropper must act quickly.

They need to measure the qubits and then send them back down to you

so you don't notice anything wrong.

But the eavesdropper doesn't know whether to measure vertically or horizontally.

If they guess wrong, the qubit changes.

Plus, they wouldn't even know if they guessed right or wrong in the first place, so they

can't fix their mistakes.

Maybe, they could make copies of the qubits, send one copy to you so you don't notice

anything wrong, and then try all sorts of different measurements

on their own copies to figure out what the qubits were.

Too bad they would need to break the laws of physics to do that.

A principle of quantum mechanics known as the no-cloning-theorem tells us that you can't

make copies of qubits if you don't already know what they are.

If the eavesdropper wants to know anything at all,

they need to measure the qubits.

And unfortunately for them, that means they either need to send you

contaminated qubits or dummy qubits of their own.

Even if the eavesdropper eventually sees you and the server

saying which orientations they should have used, it's too late for them.

Unless they happened to guess the orientation correctly every single time you guessed correctly,

or if by pure chance, the qubits collapsed to the right values anyway,

you and the server will end up with different numbers.

And taking a guess on all of your qubits is pretty much the worst strategy ever.

But how do you and the server know if the eavesdropper was messing with the qubits?

How do you know if these bits are safe to use?

You randomly pick half of your bits to compare.

If they're the same, you and the server know that

the other half is the same as well, unless you're astronomically unlucky.

But to better your odds, you use more qubits so small mistakes from

the eavesdropper are more likely to be noticed.

If you ever notice a problem, you toss everything out and try again.

Hopefully the eavesdropper will respect your privacy this time.

And if they don't, try a different communication channel.

This is known as the BB84 protocol.

It's one of the simpler ways of distributing quantum keys.

There's another one called the E91 protocol that takes advantage of quantum entanglement.

This one is a little more complicated.

First of all, instead of the server generating a random bit sequence,

you both receive half of a bunch of entangled qubits from a trusted third party.

You and the server then randomly pick from 3 orientations to measure your own half.

You then compare orientations, and note the ones that were the same.

But instead of throwing the rest of them away,

you can use the mismatches to check for an eavesdropper.

You know there was an eavesdropper if something called Bell's inequality was satisfied.

If Bell's inequality was not satisfied, it means that there was no eavesdropping, and

the key is safe to use.

Of course these protocols aren't perfect.

They rely on accurate transmission of qubits, which doesn't always happen in the real world.

So in reality, you need to sacrifice a bit more information

to do error correction.

And that's assuming you can even send qubits in the first place.

The existing infrastructure of the internet cannot.

But small quantum networks are being built.

They have all even successfully performed the BB84 protocol.

In addition, these protocols also don't fix all the problems the classical ones have.

For instance, man-in-the-middle attacks are still possible, where the eavesdropper impersonates

both you and the server, so neither of you notice anything wrong.

Denial of service attacks still are possible by simply "eavesdropping" on purpose.

The eavesdropper will be detected every time, but you and the server will never be able

to make a key, and thus can't communicate securely.

The solutions to these problems may involve broader fields,

such as authentication and networking.

In the end, quantum computers are a double edged sword, at least in the world of security.

They break our current system, but they open the door for more advanced ones.

But isn't that pointless?

Why develop quantum computers in the first place if they break and then re-solve the same problem?

Why the trouble?

It's because they open up new possibilities.

Breaking security is just one of many things they can do.

They can also improve database performance, and give us more accurate simulations of quantum mechanics,

which could accelerate research in medicine

or other technologies.

Every new discovery comes with opportunity and costs.

We can't complain when the eavesdroppers are just using superior tech to our own.

The threat is real, but people believe in advancing science and technology,

because of its potential to improve our lives. Sometimes...

we just need to keep up with it.

Oh no...

The video intro's out of date!

For more infomation >> Will Quantum Computers break encryption? - Duration: 15:45.

-------------------------------------------

Amy Vachon remaining as interim coach next season - Duration: 1:27.

NOW, TOTAL SPORTS

WITH TRAVIS LEE.

POWERED BY CHEVY SILVERADO.

TRAVIS: WE ARE ON THE EVE OF

BASEBALL HERE IN PORTLAND AS THE

SEA DOGS PREPARE FOR ANOTHER

SEASON OF BASEBALL IN MAINE.

THIS IS THE WELCOME BACK DINNER.

A GREAT CAUSE HERE IN SOUTHERN

MAINE.

WE START WITH BASKETBALL NEWS.

RICHARD BARRON IN THE UNIVERSITY

OF MAINE'S WOMEN'S BASKETBALL

TEAM.

HE WILL BE BOEHNER HIM HEAD

COACH FOR ALL OF NEXT SEASON.

HE TOOK OVER IN EARLY JANUARY.

TODAY WE LEARNED, FOR THE FIRST

TIME THE NATURE OF THOSE ISSUES.

HE SAID HE WAS FEELING SICK OF

DECEMBER, AND THEY HAD TROUBLE

DIAGNOSING THE CONDITION.

HE SAID IN A PRESS RELEASE TODAY

HE HAS TWO PARALLEL CONDITIONS,

DEMYELINATING PERFPHERAL

NEUROPATHY AND VESTIBULAR

NEURITIS.

THEY CAUSE PAIN, NUMBNESS, AND

WEAKNESS IN HIS ARMS AND LEGS.

ALONG WITH MIGRANES.

ONCE FEARED TO BE TERMINAL, HE

ADDED HIS DOCTORS ARE OPTIISTIC

ABOUT HIS FUTURE, BUT IT COULD

BE A EURO LONGER FOR HIM TO GET

BETTER.

>>

HE HAS POURED HIS HALL --

HEART AND SOUL INTO IT, SO IT IS

HARD FOR HIM TO STEP AWAY.

I THINK FOR HIM TO BE ABLE TO DO

THAT AND KNOW THAT IT IS IN GOOD

HANDS, I THINK THAT WILL BE GOOD

FOR EVERYBODY.

For more infomation >> Amy Vachon remaining as interim coach next season - Duration: 1:27.

-------------------------------------------

Search for missing Yuba College student enters 6th day - Duration: 1:22.

IN LIVE OAK TODAY, RESIDENTS

LIKE ANDREA ARE STUNNED BY THE

DISAPPEARANCE OF A YOUNG COLLEGE

STUDENT.

>> IT IS CLOSE TO HOME.

I WAS RAISED HERE IN LIVE OAK.

MY KIDS GO TO SCHOOL HERE.

IT HAPPENS TO THEM, IT COULD

HAPPEN TO ANYBODY.

MIKE: THIS WOMAN HAS BEEN

MISSING FOR SIX DAYS.

THE TRUCK AND CELL PHONE

RECOVERED, BUT NOT THE

20-YEAR-OLD.

HER PICTURE IS POSTED AT THIS

AUTHENTIC MEXICAN RESTAURANT.

>> FAMILY OF THE MISSING DRUG

INTO OUR BUSINESS, AND THEY ARE

PUTTING FLYERS ALL OVER.

IT IS A SMALL COMMUNITY, SO WE

ARE CONCERNED.

MIKE: SEARCH CREWS HAD DOGS OK

FOR CREWS -- CLUES.

THERE IS NO EVIDENCE OF FOUL

PLAY BUT NO TRACE OF THE MISSING

COLLEGE STUDENT WHOSE MISSED --

DISAPPEARANCE HAS RAISED

CONCERNS.

>> YOU WALK IN THE SCHOOL

PARKING LOT ALONE, IT IS SCARY.

MIKE: AND FOR STUDENTS, LIKE

THIS WOMAN WHO IS ALSO A MOTHER,

THIS HAS MADE HER HESITANT TO GO

ANYWHERE ALONE.

>> EVERYBODY IS GEARED.

THIS DOES NOT HAPPEN HERE.

LIVE OAK IS SMALL.

For more infomation >> Search for missing Yuba College student enters 6th day - Duration: 1:22.

-------------------------------------------

7 MUST HAVE Marketing Tools To Use On Your WordPress Site - Duration: 7:34.

A WordPress website without marketing tools will always be like a warrior without weapons…

You're ready to rock, but you're missing the essentials.

Hi, I am Robert from Themeisle.com and in this video, I'll show you seven Marketing

tools to use on your WordPress site.

INTRO

1.

GOOGLE ANALYTICS

The one and only!

It brings you lots of insights about the people that come to your site and their specific

behaviors.

Thanks to this tool, you will be able to track your audience's actions on the site and

read their minds.

I mean, somehow anticipate what they're up to.

To be more specific about what you can find with Google Analytics… well, sort of everything.

In a word, stats!

Such as the total number of users in a given period, pageviews, sessions and pages per

session, bounce rates, session durations, most popular posts/pages, conversions, etc.

Knowing your people is a goldmine because it takes you closer to your goals.

Google Analytics is a free tool and can be integrated with your WordPress site through

a simple embed code provided by Google.

2.

SENDINBLUE

For the record, email still rocks when it comes to marketing.

Email is one of the most effective marketing strategies for making people come back to

your site.

And SendinBlue?

It has a friendly and easy-to-use dashboard, where you can carefully keep all your email

drafts and user lists.

You can also use it to send out your marketing email, transactional email, and even mobile

messages.

Once you send an email, you get detailed reports and stats, so you can see what works and what

doesn't right away.

Open rates, click rates, user engagement data … it's all there.

SendinBlue is a paid tool, but it also comes with a free plan.

3.

WORDPRESS SEO BY YOAST

Yoast SEO is the most popular WordPress plugin when it comes to search engine optimization,

and it's completely free.

Actually, it is one of the most downloaded WordPress plugins ever.

It comes with three important settings for each of your posts and pages: title, meta

description, and meta keywords.

And not only can you write your custom text and keywords, but the plugin also lets you

know how weak or strong the optimization is.

Under the hood, it also takes care of a number of optimizations that don't require your

assistance.

4.

REVIVE OLD POST

This free tool will save you a lot of time by automatically posting your articles to

social media.

Don't let your posts only live for a short period of time and then be forgotten.

Revive Old Post can be set to auto-share at constant intervals.

You can set lots of things about the shares: the intervals between shares, how old should

a post be in order to be shared, how many posts to share daily, and how many times each

one should be shared, what kind of format the article should have when posted, and more.

The free version of the plugin can share your content to Twitter and Facebook.

To get additional exposure – LinkedIn, Tumblr, and Xing – you'll need the pro version.

5.

PAGEBUILDER BY SITEORIGIN

Yet another free WordPress plugin.

This one helps you create great landing pages in an easy fashion – through drag-and-drop.

Landing pages can help you make your offer more clear, and thus make it easier for the

visitor to decide whether they want any part of it or not.

Landing pages usually target a specific audience and focus on a very specific goal.

Most commonly, those goals can be selling a product, a giveaway, email subscription,

etc.

Now, PageBuilder by SiteOrigin is a free tool for WordPress that helps you create a landing

page.

It's very simple, and you don't need any technical knowledge in order to use it.

You can either create an original landing page from scratch or use a pre-built layout

provided by the plugin, which you can then customize.

6.

AB PRESS OPTIMIZER

A/B testing is a great method to improve the performance of a landing page with.

Whether it's visitors we're talking about, clicks, conversions … A/B testing can help

you with whatever goal.

And AB Press Optimizer is a great plugin that does all that.

Basically, it lets you take two pages and put them against each other.

The pro version starts at $49, but there's also a free version in the WordPress directory.

How does it work?

Well, you add experiments easily by going through a simple settings panel.

Name your experiment, add a description, the time period for the test, and set a goal and

the URL of the page that you want to test.

After a while, the plugin will start informing you of the results.

7.

CANVA

The last one in our video is Canva.

This is a D-I-Y graphic design platform developed with non-designers in mind.

Embedded with an intuitive drag-in-drop user interface along with a massive library of

pre-designed templates and free stock photos, Canva makes it really easy for anyone to create

professional-quality image graphics effectively enhancing their visual content.

It caters to a wide range of design types such as blog post graphics, presentations,

digital flyers, letterheads, advertising graphics, and so much more.

You can basically create almost any visual element you need for personal or professional

purposes.

The usage of the platform is free and you will only need to pay when you utilize premium

elements.

Take note that Canva has thousands of free design elements and images.

The tool is available in the following formats: for the web, for iPad, and for iPhone.

If you have further questions about any of the marketing tools in this video I will happy

to answer them in the comments section below.

For more infomation >> 7 MUST HAVE Marketing Tools To Use On Your WordPress Site - Duration: 7:34.

-------------------------------------------

La bruja Zulema asegura que esta sombra es Satanás | Al Rojo Vivo | Telemundo - Duration: 2:41.

For more infomation >> La bruja Zulema asegura que esta sombra es Satanás | Al Rojo Vivo | Telemundo - Duration: 2:41.

-------------------------------------------

Críticas a Kendall Jenner por comercial de Pepsi | Al Rojo Vivo | Telemundo - Duration: 0:36.

For more infomation >> Críticas a Kendall Jenner por comercial de Pepsi | Al Rojo Vivo | Telemundo - Duration: 0:36.

-------------------------------------------

Indignación en la familia de Jenni Rivera | Al Rojo Vivo | Telemundo - Duration: 1:42.

For more infomation >> Indignación en la familia de Jenni Rivera | Al Rojo Vivo | Telemundo - Duration: 1:42.

-------------------------------------------

Alcalde de Guerrero en problemas por auto lujoso | Al Rojo Vivo | Telemundo - Duration: 0:54.

For more infomation >> Alcalde de Guerrero en problemas por auto lujoso | Al Rojo Vivo | Telemundo - Duration: 0:54.

-------------------------------------------

2 killed in Stockton deadly crash were teenagers - Duration: 1:16.

D TO SOME FRIENDS

OF THOSE SUSPECTS WHO SAY THEY

ARE JUST IN DISBELIEF.

>> YEAH, I CRIED MOST OF THE

DAY.

MELINDA: FRIENDS OF THE

15-YEAR-OLD AND 17-YEAR-OLD

MORNEAU DEBTS TODAY.

>> WE FOUND O -- MORE AND

THEIR DEATHS TODAY.

WE FOUND OUT ABOUT IT AT

SCHOOL.

MELINDA: THEY DIED IN A CAR

CRASH.

THEY TRIED TO ROB A WOMAN OF HER

PURSE.

THEN OFFICERS SPOTTED THAT CAR

HERE ON HAMMER LANE AND

STOCKTON.

THEY TRIED TO PULL THE CAR OVER,

BUT SUSPECT SPED AWAY LOST

CONTROL.

>> T WHEELS COME THROUGH THE

INTERSECTION AND GRADUALLY

ROLLED ON ITS SIDE AND SLID.

THE PASSENGER WERE DRIVERS

COMPARTMENT HIT THE FRONT END OF

THE SUV.

MELINDA: THEY HIT THREE OTHER

CARS AND THE BICYCLE.

PEOPLE ARE IN SHOCK.

MANY DESCRIBED THE TEENAGED

SUSPECTS AS GOOD FOOTBALL

PLAYERS.

>> HE WAS NEVER LIKE THAT.

I BELIEVE IT WAS THE WRONG

PLACE.

For more infomation >> 2 killed in Stockton deadly crash were teenagers - Duration: 1:16.

-------------------------------------------

Phim hay - Phim hoạt hình - Quà tặng cuộc sống - SỰ TÍCH TRÁI SẦU RIÊNG ► Phim hoạt hình hay 2017 - Duration: 16:01.

For more infomation >> Phim hay - Phim hoạt hình - Quà tặng cuộc sống - SỰ TÍCH TRÁI SẦU RIÊNG ► Phim hoạt hình hay 2017 - Duration: 16:01.

-------------------------------------------

Disfraz de muro fronterizo causa indignación | Al Rojo Vivo | Telemundo - Duration: 2:10.

For more infomation >> Disfraz de muro fronterizo causa indignación | Al Rojo Vivo | Telemundo - Duration: 2:10.

-------------------------------------------

El Loco Valdés enfrenta un tumor maligno | Al Rojo Vivo | Telemundo - Duration: 0:43.

For more infomation >> El Loco Valdés enfrenta un tumor maligno | Al Rojo Vivo | Telemundo - Duration: 0:43.

-------------------------------------------

Ximena Duque presume en video amor por su prometido | Al Rojo Vivo | Telemundo - Duration: 0:49.

For more infomation >> Ximena Duque presume en video amor por su prometido | Al Rojo Vivo | Telemundo - Duration: 0:49.

-------------------------------------------

Arturo Peniche y su esposa fueron asaltados | Al Rojo Vivo | Telemundo - Duration: 0:33.

For more infomation >> Arturo Peniche y su esposa fueron asaltados | Al Rojo Vivo | Telemundo - Duration: 0:33.

-------------------------------------------

Sacramento 11-year-old 'took 3 bullets' for toddler, mother says - Duration: 2:04.

THE HOSPITAL.

KCRA'S VICKI GONZALEZ PAID THE

FAMILY A VISIT AT UC DAVIS

MEDICAL CENTER AND LEARNED THE

STRUGGLES ALSO INCLUDE A PLACE

TO LIVE.

VICKI: CARRIE JOE IS FIGHTING.

>> TRYING TO HANDLE IT ABOUT AS

GOOD AS I CAN.

VICKI: THE MOTHER AT UC DAVIS

MEDICAL CENTER WAITING FOR HER

11-YEAR-OLD SON TO WAKE UP.

>> HE'S ON A BREATHER MACHINE TO

HELP HIM BREATHE.

VICKI: CARRIE IS KEEPING HER

CHILDREN ANONYMOUS, EXPLAINING

THE FAMILY ATTENDED A TODDLER'S

BIRTHDAY IN DEL PASO HEIGHTS

SUNDAY, WHEN THE PARTY UNRAVELED

INTO VIOLENCE.

>> WITHIN A BLINK OF A SECOND,

THAT WAS JUST A HAIL OF BULLETS

THAT STARTED FLYING.

VICKI: A SHOOTING INJURING A

WOMAN AND TWO CHILDREN,

INCLUDING CARRIE'S SON.

>> ONE WAS IN AND OUT THE CHEST.

THERE WAS ONE THAT CAME THROUGH

THE BACK.

AND BASICALLY THEY REMOVED HIS

, APPENDIX AND HIS KIDNEY.

VICKI: CARRIE'S 11-YEAR-OLD

GOING TOWARDS THE BULLETS TO

SAVE HIS 2-YEAR-OLD SISTER.

>> HE THOUGHT TO PROTECT HER,

HE SHELTERED HER.

BASICALLY HIS BODY COVERING HER.

, HE TOOK 3 BULLETS FOR HIS

FAMILY.

VICKI: A CHILD LUCKY TO BE

ALIVE, NOW A HERO.

>> YOU KNOW HE PROTECTED MY

, BABY.

I HATE THAT THIS HAPPENED TO HIM

BECAUSE HE DIDN'T DESERVE IT AT

ALL.

MY BABY IS A GOOD CHILD.

VICKI: A MOTHER'S STRENGTH

TESTED EVEN MORE.

FOR NEARLY FIVE MONTHS, CARRIE

AND HER CHILDREN HAVE BEEN

HOMELESS.

>> HAVING TO GET KIDS BACK AND

FORTH TO SCHOOL AND TRYING TO

FIGURE OUT WHAT WE ARE GOING TO

EAT, AND CLOTHES AND SHOES AND

STUFF, IT'S REALLY HARD.

VICKI: BUT THERE IS A MOVEMENT

TO MAKE HER LIFE A LITTLE

EASIER.

ALLEN WARREN: WHEN I GOT TO MY

OFFICE, PEOPLE WERE AT MY DOOR

WAITING TO GIVE CHECKS.

VICKI: COUNCILMEMBER ALLEN

WARREN NOW RAISING MONEY FOR

SUNDAY'S SHOOTING VICTIMS.

ALLEN WARREN: WE JUST WANT TO

GIVE THEM A CARE PACKAGE OF

MONEY, ACTUALLY, FOR THEM TO GO

OUT TO FIND A STABLE PLACE TO

LIVE.

VICKI: A FAMILY INCOMPLETE UNTIL

HER SON HEALS.

>> HOME IS WITH ME AND HIS

BROTHERS AND HIS SISTERS.

SO, ANYWHERE WE ARE TOGETHER IS

HOME.

Không có nhận xét nào:

Đăng nhận xét