Today I’d like to discuss interesting prospects of technology in the field today as of the year 2025.
What is the technology?
The technology I’m talking about today is AR and VR also both known as Augmented Reality and Virtual Reality.
How does it work?
Both AR and VR are comparable by their use of camera lenses to alter the space around but inversed, Augmented reality is a program that uses micro cameras to overlay the real world with digital content. Virtual Reality is changing the world around you with cameras to change the space you are in while keeping track of even the smallest obstacles in your area IE: A kitchen table!
What problem does it solve?
Today in society AR and VR technologies are being implemented into businesses and school applications with an overwhelming success rate.
Companies are reporting a 40% faster training time for new employees while education institutions are reporting a 75% increase in student engagement when using these tools.
What are the drawbacks?
While an interesting solution to humanities problems these device tools also pose relative risk when being introduced to the outside world.
Other concerns are raised around the health risks these devices pose to humans like eye strain, motion sickness, and social isolation from over-immersion.
If it were released to everyone?
If the technology was to see widespread commercial use it would lead to what some are calling the technology renaissance boom. The issue is this technology already is available to everyone as of this year anyone can acquire the tools to use and learn through the virtual space so the reasoning behind “then why no tech boom” stems from the belief that the technology is still in its infancy stages with work being done to introduce things like haptic feedback to virtual realism letting you feel and engage with the world around you.
Mobile Apps Posts
Today I wanna discuss Mobile Apps, what are their purpose? Why are people making money from them? The answer is more black & white then you think.
The first mobile app i want to discuss is Tik-Tok,
this application was released in September of 2016 and since then reported 4.5 billion downloads.
Tik-tok is widely known for it’s “shorts” which is the term used for short thirty second recordings of “content creators” doing something in front of their phone camera for viewership.
Why is Tik-Tok popular? well it’s believe it reached it’s peak around 2019 as a means to pass the time while everyone was under sustained lockdown for a brief period of time leading to the rise in viewers and “content creators” seeking to make it big on the platform.
The platform itself operates like another application called “Youtube” except with shorter videos, this is intentional as viewers attention spans grew shorter and shorter the rise in shorter and shorter content videos grew.
Tik-tok as of 2023 was priced at $66 Billion, That is the most successful startup of an app in history.
So how much does a content creator get paid on tiktok? Well the answer might scare you. As of writing a normal content creator will make between 0.02$ to 0.15$ per 1000 views while if you average around One Million followers you make reportedly around 7k to 12k PER POST.
The second mobile application I would like to discuss is one not typically discussed, it’s your phones “app store”.
The names vary based on devices between Apple and Android, but the services are about if not identical.
The application seems harmless as most people tend to ignore it or use it briefly to download content that they want on their devices then never typically touch it again except, the app is consistently operating but why?
The application store is a mobile application that comes preinstalled into all mobile devices with the sole function for the user to safely download software and applications to their phones with the peace of mind that they arent also installing malware of viruses onto their devices from third party websites.
So what is the problem with the application store?
Well the issue lies in that all iterations of the application store are a “Single Point” failure, this is referring to the rise in application software being uploaded to these webstores for users to download and use on their mobile devices. These stores rely on a “centralized control” this means that the company who created the webstore has sole jurisdiction on what applications can be uploaded to the store and what apps viewers like yourself can see. A reporter says “While this decade seems to be based on distributed systems/clouds and open standards, the application store is essentially a step backwards. It transforms the open nature of the internet into a dark age where freedom is taken away from you.” this is referring to the reports of Apples iron grip around their application store and what content can be uploaded to it for others to share and download. Developers have reported frustration with the IT logic of thinking behind constantly upgrading the terms of services of acceptable applications within their store.
CyberSecurity
This week I’m writing about some recent cybersecurity instances I found interesting and what some of their impacts are,
National Defense Corporation Ransomware
In March 2025, 4.2 tb worth of sensitive data was taken.
While this information proved to be directly classified it still rose eyebrows around the world about the safety of defense corporations.
The attack marked a shift in Interlock’s targeting strategy from broad, opportunistic campaigns to high-value defense contractors. Though classified data wasn’t directly exposed, procurement documents, logistics details, and supply chain information were compromised, creating long-term risk across the defense industrial base (DIB).
Compliance frameworks like CMMC 2.0 are critical for protecting sensitive, unclassified data, requiring defense contractors and subcontractors to implement robust access controls, encryption, and continuous monitoring, among other controls.
In the end nothing of note was pressed toward the individuals who hacked the corporation, Further investigations have followed since into the leak of crucial information to the dark web and what repercussions will follow of said information.
The national defense corporation has a strong protection plan put into place to prevent circumstances like this occuring so it remains to be seen on further details as to how the information was exposed to the dark web. Further investigations are ongoing into the sensitive data but as of now nothing of note was leaked.
“This incident emphasizes the importance of ensuring, even if you’re compliant yourself, that your entire supply chain, including third- and fourth-party vendors, meets similar security standards.”
Microsoft zero day
In April 2025, Ransomware attacks via CLFS zero-day vulnerability on organizations across the globe. In April, Microsoft patched 126 vulnerabilities, including CVE-2025-29824, a zero-day flaw in the Windows Common Log File System (CLFS) exploited by the group Storm-2460. The attackers used a custom malware strain, PipeMagic, to escalate privileges and launch ransomware across multiple sectors worldwide.
While the entry point remains unclear, Microsoft confirmed the vulnerability allowed attackers with standard user access to gain elevated privileges, a key step in post-compromise ransomware deployment. The CLFS vulnerability is part of a growing trend of privilege escalation flaws being actively exploited, according to Satnam Narang, senior staff research engineer at Tenable. “Elevation of privilege flaws in CLFS have become especially popular among ransomware operators over the years,” Narang said. “While remote code execution flaws are consistently top overall Patch Tuesday figures, the data is reversed for zero-day exploitation. For the past two years, elevation of privilege flaws have led the pack and, so far in 2025, account for over half of all zero-days exploited.”
With this information we can infer that microsoft has also since patched this vulnerability as it led to a large portion of their internal network becoming corrupted in the months that followed. While the individuals have been identified nothing of note was listed that legal action was taken against the group known as Storm-2460 so it remains to be seen if the group or individual still remains at large leaking information or important documentation around Microsoft.
Works Cited:
Fitzgerald, A. (2025, July 14). 20 recent cyber attacks & what they tell us about the future of cybersecurity. Secureframe. https://secureframe.com/blog/recent-cyber-attacks
CEO Corporation.
So let’s say that I was a IT Supervisor of a small time corporation: What kind of issues would I face on a daily basis over the internet?
Here are some examples I can give that would help me shape my company to be more secure and reliable.
Know Your Enemy
Phishing Scams: while not typically harmful if a scam acquired information on an IT specialist it could harm the entire buisness and even put alot of information on us out there where competitors can acquire it.
ransomware: yet again a tool people use to acquire information over the web and hold it hostage until a sum of money has been paid to recover said information otherwise it gets leaked globally for millions to view and even copy.
With a high turnover rate and even lower morale IT jobs are some of the highest security jobs out there managing daily scheduling and maintenance tasks to keep the work flow at an appropriate pace.
Data Breach: Data breaches are a common occurence in the workplace and many other places, these typically are due to a lack of protection over sensitive information or terminals used in the work space leaving them available to others to tamper and use to steal private information.
Bad Actors: These are individuals who pride themselves on others downfall they work for you and are all around you, these individuals are always confusing to identify but can be rooted out via protections set in place like detection softwares.
Impersonation: Another common occurence in this day and age are those who will prey on your success as a business these people will pretend to be from your company and seek to use your good name to extort things from other people, There isn’t much you can put in place to protect against this other then advising customers to be vigilante against false ads.
Know Thy Self
IT Supervisors are also responsible for managing the day to day security checks and personal tasks of other individuals this can some times mean that even the most important tasks can get overlooked leading to security breaches if not properly managed. Some of the tools we have at our disposal are Microsoft Project, Jira, Asana, Google Workspace, These tools help micromanage the daily tasks and drive performance.
ITSM: is a service tool we use to track and handle daily incidents while secure firewalls and intrusion detection softwares are put into place to allow peace of mind while in the workplace that the system is safe and no data breaches occur.
Firewalls: firewalls are a build in protection software to stop suspicious actions being accessed over data terminals or blocking actions that may jeopardize technology security over your system.
Detection Software: Detection softwares are designed to be risk free with a guarantee to keep track of everything that is accessed over the companies terminals, you may also securely set what may be accessed and from where. With some softwares offering extra protection in managing daily browsing to keep you informed if any suspicious activity is happening from one of your terminals.
Developing A Strategy
In my company I would make sure the day to day had proper security protocols and firewall protections in place through incorporating the usage of google applications and outlook for a more outdated communications team while security would have tools like Incryption software, Malware Detection, CyberSecurity Monitoring, these tools would drive home the safety of my company while I get peace of mind that not only my staff but I myself am safe while browsing the web from my office. Virtual Private Networks are a great tool to secure data from prying eyes offering a further secure server from any data breaches that may occur.
For a company to prosper the proper precautions must be trained and taught at a base level so everyone knows what to expect when it comes to phishing scams, and malware installations so prioritizing the training of my employees to look out for suspicious activity and scanning bad actors in the workplace is a must from the day to day challenges we may face while in the workplace. Sometime Badactors are suspicious individuals with intent to break into secure servers to acquire data that fills their pockets these people can be identified via long periods of screen time in isolated portions of the building so identifying these individuals through secure channels is a great ground base excercise to help employees understand the risk these individuals pose to the company and the workplace. While my company may offer open office hours to guests long periods of prolonged use of devices should be asked to leave the premises for security reasons.
where to turn?
Technology changes faster then us humans can keep track and with the huge leap we’ve taken so to has the information collected and shared via technology, below I want to cover three sources ive collected to discuss what remains viable in the graphic design space when you feel stuck or confused on what to do when creating artwork like using a specific tool. Below i’m going to list three of the sites or programs I’ve found for finding information on learning graphic media while on the interwebs.
1: Adobe Learn: I have used this website on multiple occassions to check and also follow along when working on projects as it reminds me how to use specific tools and the best strategies in breaking my artwork apart into segments so the work flows easier. Adobe is also the producer of alot of the software artists use to create their art pieces, with this being said I found that tutorials were posted for the audience to grow familiar with it’s tools. While I could not find any comments or pages to figure out who manages the tutorials they have properly listed times to complete tutorials and allow you to flow at your own pace. Adobe is a lead in this field as mentioned before they produce the software artists use to create and or learn to create art. I highly recommend using Adobe’s Learn program to learn using their own programs as they tutorials are posted and quality checked by their own team of professionals.
2: Youtube Tutorial: This was another source I wanted to evaluate as while the information can be valid the criticisms lie in how up to date information can be around this platform. The video I have used for this research was posted about a year ago and upon review still holds up extremely well. Comments mention “Easy to Follow” and “Makes me want to pick up photoshop again” leaving me interested in watching the tutorial for myself. Now with any video comes with management, as of writing their does not appear to be any comments from the poster on said video or a notice of potential outdated information meaning that the video also can lead to the audience unable to follow along if they so choose. While I’m all for following along with a video as stated with my previous topic these videos are posted by the audience for the audience as quick easy cheat guides and can over time deteriorate in terms of how well the information shared holds up especially if the tutorial is not frequently updated with new information around updated tools and segments within programs.
3: SkillShare: I wanted to use this example merely to discuss taking the classroom approach when it comes to digital media. Skill share is a program that allows you in a class setting to learn skills on your own time and at your own pace. I found this website to be a rather conflict of interest for me as Adobe themselves offer tutorials and guides to follow along with and while the program isnt free to use having the addition of free tutorials is a huge win while Skill share is a paid extention after a free month trial. I find it hard to believe students or even masters of graphic media would pay to learn from someone else when the information is free and easy to gain on ones own expeirence or through other means like the tutorials discussed above. Something I will attribute to SS is having hands on guidance with one of the online teachers to help walk you through online projects while this may be extremely handy over watching a video tutorial I still find that extra 1 on 1 guidance is defeated by needing to pay someone to teach you Photoshop just for the picture perfect shadow effect.
Cited:
https://www.youtube.com/watch?v=qwNbjGyhZ48
https://www.adobe.com/learn/photoshop
https://www.skillshare.com/en/join/ps-photoshop?g_acctid=801-939-2003&g_adgroupid=&g_adid=&g_adtype=none&g_campaign=Adobe_Photoshop_IP_pMAX_US_Non-Branded&g_campaignid=21995356256&g_keyword=&g_keywordid=&g_network=x&utm_medium=pmax&utm_campaign=Adobe_Photoshop_IP_pMAX_US_Non-Branded&utm_source=google&utm_term=&matchtype=&locale=en&g_adid=&g_adgroupid=&g_adtype=&coupon=PMAX30DAYSFREE&gad_source=1&gad_campaignid=22545042909&gclid=Cj0KCQjwrojHBhDdARIsAJdEJ_cGCrGJ13VDWS6nqmOOYBJ_XHgbRsVVxWJ1D6DDHUWhtSgstCmqOtcaAppHEALw_wcB
Content Management Systems Post
(CMS) Content Management System is a software designed to be a hub for teams to collaborate editing, publishing, and updating materials effeciently.
CMS’s are a beneficial tool anyone can use to create, design, and simplify the bridge from business to customer.
2: CMS is a software that allows users to create, manage, and publish digital content for websites and other digital channels. It’s also beneficial for developers to manage tasks and track key data with little to no scripting required on their end.
While doing research I noticed it’s a mixed bag of interpretations on whether CMS is solely used for website design or has other functions so I will leave my opinions that it’s uses can be extended to other platforms on the table.
3: CMS vs HTML, CMS has the ability as stated before to create websites without the use of scripts or coding knowledge this makes it extremely easy for anyone to pick up and design a website of their own while HTML is a fundamental system to port a website to any device with the authors ability to shrink, scale up, resize, to fit any device screen. The drawbacks is HTML requires some extensive knowledge on coding while CMS does not this more then likely draws more users to CMS website building over HTML for the ease of access over its competitor.
With the use of either one must take note of what they are looking for when designing their website and what function works best for them, while CMS is great for easy creation HTML may be better suited to make sure your website fits the audiences devices drawing more views.
With a friendly user interface and key tools to help design websites and background analytics more large scale business’s are making the switch to CMS services not just to meet their audiences but to help themselves standout whether thats on social media or web based pages the content transfers seamlessly and effortlessly across all devices.
The hugest tool to me would be the analytics tracker, this tool comes in handy to see what the most engaging portions are of your website whether this is a shop or other attention grabbing page this helps decide on the structure and orientation I would set for my website and how I grab the attention of my audience further in the future.
4: CMS is a great tool to have under anyones belt while I would agree the program could take away business from actual developers this makes setup effortless and easy while a developer could be stuck coding and scripting a website with minimal returns for orientation or presentation to an audience this leads to a dip in overall appearance and audience. Developing or CMS’ing a website is up to the creator but I’d choose a CMS built webpage over a scripted anyday with the tools ive seen are given at a click away to ease the workflow It’s no wonder other business’s choose to use a CMS based.
Works Cited:
What is a content management system (CMS) and how does it work? (n.d.). https://business.adobe.com/blog/basics/what-is-a-cms-and-how-does-it-work
Research Post
Internet and it’s vast history has always been a frequent topic in today whether that’s “Do videogames cause violence” or the recent “ban on Tiktok”.
I wanted to cover some frequent questions we ask or see when we discuss technology and it’s repercussions as we move forward,
Technology is anything that consists and operates with digital media through a screen on a small or large device IE: smart phone or personal computer.
As of November 2024, nearly 65% of internet traffic comes from the use of mobile traffic meaning that most of our daily usage of technology comes from our portable devices. So who runs this world wide internet service we all know and love so much? well you might find that no single entity owns the entirety of the internet instead stakeholders and governments all of which develop web standards and manages the domain names.
Tim Berners-Lee also known as “TimBL” is a proud computer scientist attributed with the invention of HTML and the World Wide Web, His inventions are the exact programs and sources we use today in our day to day lives and while they have changed over time they retain alot of their functions. Tim also founded the world wide web consortium (W3C) to ensure the web remains a royalty free program. If you dont understand what that means, it means that there had been potential for you to pay money to use a service such as the web. could you imagine paying some X amount of money to go to a library and find information you were looking for in this day and age?
Today we as humans have lots of tools at our disposal to stay in touch and one of the largest is “Blogs” these blogs allow us to share our opinions and statements with everyone and even recieve feedback in a neutral feed, blogs are useful for documenting and even sharing information with others on a day to day basis without bias and politics (yes even that photo of your dog ruffus who got into the trash).
Something else I’d like to cover is the use and background to “Responsive Websites”, these websites automatically adjust the viewing expeirence for the audience allowing them to surf the web and find what they are looking for across all devices from cellular to even personal computers. This optimization typically results in viewers not needing to find another webpage or screenshot certain information for personal use if they can just pull it up and share it.
My passion for technology has always led me to believe in starting my own youtube channel, I have the drive and passion to create and involve those around me to expeirence the same things I do. Youtube is one of those platforms where I could share the content I want to share in a semi filtered environment and meet people with similar interests through the content we share it would be an honor and pleasure to be among the few who make it on platforms such as those.
Citations
Albert. (2025, June 19). Mobile vs. Desktop Traffic Share & Trends. Digital Silk. https://www.digitalsilk.com/digital-trends/mobile-vs-desktop-traffic-share/#:~:text=As%20of%20November%202024%2C%2064.04,devices%20to%20access%20the%20internet.