Skip to main content

Zinedine Zidane to be PSG next coach


 

Paris Saint-Germain manager Mauricio Pochettino remains at the helm of the capital club, but it appears as though it’s all in name and it’s only a matter of time before he’s sacked. The Ligue 1 giants have been keen on hiring former Real Madrid boss Zinedine Zidane.


The pursuit of the French tactician has been constantly reported for the last few months and intensified when PSG crashed out in the UEFA Champions League Round of 16. However, Zidane is a complicated objective since he might have his eyes on the France national team job.



Nonetheless, RMC Sport’s Daniel Riolo stated on After Foot RMC (via Hadrien Grenier) that Zidane will be the next PSG coach. The report adds that in March, the 49-year-old knew he would be managing Kylian Mbappe.

Nothing is set yet, but this would be PSG’s dream scenario: keeping Mbappe away from Real Madrid by reaching an extension and appointing Zidane as their new manager as the two faces of this new era in the French capital. 

Comments

Popular posts from this blog

AirPods Fake Vs Real – How To Spot Fake AirPods In 2021 (Ultimate Guide)

AirPods Fake Vs Real – How To Spot Fake AirPods In 2021 (Ultimate Guide) Need your item authenticated by us? Proven expertise, not self-claimed. Get checked by the industry's top experts. Get Authenticated Want this item? Buy it from our partners! Looking to learn how to spot fake AirPods? Scared of getting scammed? Look no further, as we’ve compiled the most complete legit check guide for Apple AirPods. To put it shortly, the quickest way to spot fake AirPods is to scan the serial number found on the inside of the case (see pictures below on how to find that serial number). Once you get that code, pop it through  checkcoverage.apple.com  and see whether Apple confirms it for you. If you can’t get ahold of this code, we’ve added fake vs real comparisons for the actual AirPods below! Remember, fake AirPods will always compromise on quality. To highlight the most common places where these compromises are made, we’ve put together the comparisons you’ll find below. In this gu...

Aina ya sita ya vyakula ambavyo vikichanganywa hugeuka sumu

  Aina ya sita ya vyakula ambavyo vikichanganywa hugeuka sumu Kila binadamu ana kile alichojaaliwa na Mungu. Siku zote anachoamua mmoja kula huenda kikawa sumu kwa mwingine. Chakula anachokula mtu kinaenda sanjari na hali ya kiafya. Wengine huumwa hadi kusababisha kupoteza uhai na hii ni baada tu ya kupendelea kuchanganya chakula. Mtu mmoja anaweza kula sawa na kwa urahisi, ila kwa mwingine kikageuka sumu. Hali hii huchochewa zaidi na matokeo ya baadae pale unaposhindwa kuweka mchanganyiko sahihi na wenye afya zaidi . Kila aina chakula ina faida zake, ila kinapochanganywa kinaweza kusababisha shida kwa mtu. Kwa watu ambao wanataka kuchanganya lishe ili kupunguza unene na vichocheo vyake ni vyema kushauriana na wataalamu jinsi ya kupanga lishe bora. Mtaalam wa lishe wa Nigeria Habiba Haruna ameiambia BBC kuhusu aina sita za chakula ambazo zinaweza kuwa sumu kwa mtu yeyote. Samaki na Maziwa Samaki na Maziwa ni vyakula vyenye virutubisho lukuki na kuvichanganya katika sehemu moja vina...

What is the difference between viruses, worms, and Trojans?

This document discusses computer viruses and how they differ from Trojans, worms, and hoaxes. Solution The term virus is often used as a generic reference to any malicious code that is not, in fact, a true computer virus. This document discusses viruses, Trojans, worms, and hoaxes and ways to prevent them. What is a virus? A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria: It must execute itself. It will often place its own code in the path of execution of another program. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike. Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and ...