Parenting Influencer Kelly Hopton-Jones Says She Accidentally Ran Over Her Toddler Son | Influencers, Kelly Hopton-Jones | Celebrity News and Gossip | Entertainment, Photos and Videos


Kelly Hopton-Jones is speaking out.

The 36-year-old parenting influencer, who is the mother to two children, addressed a horrible situation on Instagram on Wednesday (April 15) after accidentally running over her 23-month-old son, Henry.

“Today has been the worst day of our lives,” she began.

“Life can change in the literal blink of an eye.”

Keep reading to find out more…

“A true nightmare for a parent happened to us today. It started like any normal day. I was taking Lily to get donuts before her dance performance,” she wrote, referring to her 4-year-old daughter.

Brian was staying home with Henry and was going to meet us there,” she continued, referring to her husband and son. “He helped Lily into the car and was waving goodbye between our car and Henry, who was in the garage.”

“In a matter of seconds, our son was run over by our car. I was driving,” she wrote.

“Our neighbors stepped in immediately and took Lily, and we rushed to the emergency room. X-rays of his legs, chest and neck are all normal. CT scans show no injury to his organs or spinal cord. Neurological exam has been reassuring with no signs of head injury or impairment.”

“He does have fractures to his pelvis that will take time to heal, as well as a few abrasions. What stays with me is the doctor saying ‘He is hurt, but this is something he can recover from.’ A true miracle. We are in shock. We are so sad. But we are so incredibly grateful. We keep replaying it, trying to understand how this could have happened when we were right there. I don’t have that answer,” she continued.

“But I do know this has changed us. Non negotiable to hold or hold hands with young children around vehicles. Do not assume they know or will stay where you last saw them. Even when you are not distracted. Even when you are not rushing. It can still happen in the blink of an eye. We are holding him a little tighter tonight,” she concluded, along with a photo of their son in a hospital bed.

“I can’t even let my brain fully go to how different this situation could be right now. It’s so easy to start questioning everything. If the morning had looked different. If B had gone to work like he normally would have, both kids would have been safely in their car seats,” she captioned the post.

“Why weren’t we holding him. Why didn’t I double check before pulling out. We could drive ourselves crazy with the what ifs, and honestly, we are a little bit. But accidents happen.”

“And I keep coming back to what I would tell my own kids one day if this happened to them. It would be a lot kinder than the things we’re telling ourselves right now. Accidents happen, and the only mistakes are the ones we don’t learn from. We’re on the lucky side of a very tragic accident,” she concluded.

“Peds NP & mama of two. Baby and toddlerhood is kinda my thing. Sharing what’s in my brain at the moment,” her bio reads on her account, which has over 60,000 followers.

On the family’s website, a bio reads: “It all started with us- Brian and Kelly. We bought an 1860 stone farmhouse on Hillside Avenue in my hometown, naming it Hillside Farmhouse. We renovated that old house for years while navigating infertility. I wrote a children’s theme book called Someday during that journey for us, to help provide some peace in the season of wait. We welcomed out sweetest Someday years later, and followed our hearts back to Brian’s hometown in Texas. We bought at 1970’s fixer upper, sight unseen, that we renovated enough to get to a stopping point. We still love home renovation and design, but currently in a phase of contentment until we have time and money to tackle more projects. Soon after our daughter turned one, we found out about our happy little surprise after navigating infertility previously. – Kelly, Brian, Lillian, & Henry

See the full post above.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


cyber security technologies – Table of Content

As we journey through the digital age, the omnipresence of cyber technology has become a double-edged sword. It is indicating not only advancements but also escalating the risks of cyber attacks. This inevitable parallel evolution of technology and cyber security demands a proactive stance in identifying and integrating emerging Cyber Security solutions to bolster our defenses. This blog delves into the forefront of cybersecurity technologies.

List of cyber security technologies :

  1. Artificial Intelligence & Machine Learning
  2. Internet of Things
  3. Blockchain
  4. Cloud computing
  5. Web security 
  6. Application Security
  7. Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
  8. Data Loss Prevention (DLP) & Data encryption
  9. Firewalls
  10. Social engineering or insider threat 

Wish to make a career in the world of Cyber Security? Start with Cyber Security training!

Cyber Security Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

1. Artificial Intelligence & Machine Learning: 

Artificial Intelligence

AI embodies the replication of human intelligence within machines designed to mimic human thought processes and behaviors. Central to AI is its capability to autonomously perform tasks to achieve specific objectives, leveraging its capacity to learn from experiences and adjust to new scenarios.

Machine Learning (ML)

As a subset of AI, ML highlights the development of intelligent systems through statistical learning. It involves intricate algorithms analyzing vast datasets to identify patterns, enhancing machine responsiveness in unfamiliar situations.

Secure Your Future with Cyber Security Training in Hyderabad!

2. Internet of Things:

IoT connects devices across the internet, creating a vast network of interconnected digital entities. It ranges from smart home appliances to advanced self-driving vehicles. These devices, equipped with sensors, feed data into IoT platforms, which then analyze and utilize this data to enhance user experience and efficiency.
Example: Smart homes epitomize IoT’s convenience, allowing remote control over home appliances for improved lifestyle automation.

If you have any doubts on Cyber Security, then get them clarified from Industry experts on our Cyber Security Tutorial !

3. Blockchain:

Blockchain, a digital transaction ledger, is eminent by its robust security features. Its decentralized and transparent design makes it a formidable tool against data tampering and cyber threats. In cyber security, blockchain’s decentralized nature and transparent, immutable ledgers provide a solid base for securing data integrity and secrecy.

How is blockchain helping cyber security?

Blockchain has in-built transparency immutable and DTL features that can help solve today’s cybersecurity problems. These features of blockchain help to handle the integrity, confidentiality, and availability of the information. Moreover, Blockchain systems are decentralized. So, the failure of one node does not affect the whole network.

4.Cloud Computing:

Cloud Computing delivers various services through the internet, including storage, databases, servers, and software. It offers significant benefits such as scalability, cost-effectiveness, and enhanced performance but also brings potential risks like data loss, reduced control, and dependency on third-party services.

5. Web security:

In an era where the internet connects globally, web security becomes crucial. It protects data, users, and systems from cyber threats through various means, such as vulnerability management and secure web applications.

6. Application Security:

This aspect focuses on securing apps from threats by integrating security features during development. It addresses data leakage and software bugs to safeguard sensitive information and maintain application integrity.

Wish to make a career in the world of Cyber Security? Start with Cyber Security training in Kolkata!

hkr trainings logo

Subscribe to our YouTube channel to get new updates..!

7. Intrusion Detection System (IDS) and Intrusion Prevention System

IDS monitors network traffic for suspicious activities requiring human or automated response, while IPS actively blocks potential threats based on predefined rules. Both systems play a critical role in maintaining network security.

How can IDS & IPS avoid potential risks?

Any company with an Internet connection has the potential to be vulnerable to network intruders. The easiest way to stop them is for blocking the services you don’t need, neither at the entry point of your network nor on your computer. 

An IPS will prevent attacks by depositing malicious packets, blocking offensive IP addresses, and alerting security staff to potential threats. Such a system typically uses an existing database for signature recognition and may be programmed to recognize traffic-based attacks and behavioral anomalies.

When a security policy breach, virus, or configuration error is detected, an IDS may remove an offensive user from the network and send an alert to security staff. In addition, an IDS detects only continuous attacks and not incoming aggressions. In order to prevent them, an intrusion prevention system is needed.

8. Data loss prevention (DLP) & Data encryption:

Data loss and encryption protect sensitive information from unknown access or corruption. Encryption is key in securing data, using techniques like AES, RSA, and DES to encrypt and secure data.

9. Firewalls:

Firewalls are pivotal in network security, monitoring and controlling incoming and outgoing traffic based on security rules. They can be software-based, hardware-based, or a combination of both and are essential in defending against external cyber threats.

10. Social engineering or insider threat:

It refers to manipulating individuals to gain unauthorized access to sensitive information. It highlights the human aspect of cybersecurity, enhancing the need for awareness and training to combat such threats.

Enroll in our Fortigate ii Training program today and elevate your skills!

Cyber Security Training

Weekday / Weekend Batches

Conclusion

Exploring these diverse cyber security technologies offers insights into the multifaceted approach required to safeguard our digital landscape. Each technology plays a pivotal role in fortifying our cyber defenses, from AI and IoT to blockchain and cloud computing. Stay connected with HKR Trainings for more informative content on cyber security and beyond.

Related articles:

Cybersecurity framework



Source link