What’s Next: Future Tech: AI

AI refers to computer systems capable of performing tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and language understanding. AI works through algorithms, which are sets of instructions or rules designed to process data and make decisions. A prominent subset of AI is machine learning (ML), where systems improve their performance over time by analyzing patterns in large datasets. For example, deep learning—a type of ML—mimics the neural networks in human brains to achieve remarkable feats, such as natural language processing and image recognition.

AI requires a combination of hardware, software, and networking to function effectively:

Hardware: High-performance GPUs, TPUs (Tensor Processing Units), or other specialized processors for handling complex computations.
Software: Frameworks like TensorFlow, PyTorch, or OpenAI’s own architectures enable the development and deployment of AI models.
Network: Reliable and high-speed internet is essential, particularly for cloud-based AI solutions, to ensure rapid data transfer and accessibility.

 AI is widely available to the public. AI-driven tools are integrated into applications like virtual assistants like Siri or Alexa, recommendation systems like Netflix and Amazon, and productivity tools, like ChatGPT. Many open-source frameworks allow developers to build their own AI solutions, while cloud providers like Google Cloud, AWS, and Microsoft Azure offer AI as a service.

The roots of AI trace back to pioneers like Alan Turing, who proposed the concept of machines simulating human intelligence in the 1950s. Later, in 1955, John McCarthy, who coined the term “Artificial Intelligence,” laid the groundwork for modern AI research. In 1966, Eliza, one of the first chatbots, simulated conversation. In 1997, the chess AI DeepBlue won a game of chess against champion Garri Kasparov. And, in 2011, the supercomputer Watson won Jeopardy against two human competitors, and Siri was first introduced in 2011. In 2014, Alexa was introduced by Amazon and became available for use in our homes. In more recent years, organizations like OpenAI, DeepMind, and Google Brain have been instrumental in advancing the field with innovations in deep learning and large-scale models.

AI addresses a wide range of challenges by automating complex, time-consuming tasks and making data-driven predictions. For businesses, AI enhances productivity, optimizes operations, and enables personalization. For individuals, it simplifies tasks like navigating traffic, learning languages, and managing daily schedules.

AI is not without risks. Ethical concerns, such as bias in AI models, arise when training data is not representative or balanced. Privacy issues stem from AI’s reliance on vast amounts of user data. Additionally, the automation of jobs may lead to significant workforce displacement. The misuse of AI—for misinformation campaigns or surveillance—also presents serious societal concerns. In fact, in 2018, the EU (European Union) established guidelines on ethics needed in AI.

One example of AI’s transformative potential is in healthcare. With widespread adoption, AI could revolutionize diagnostics by detecting diseases earlier and with greater accuracy. It could also streamline administrative tasks, enabling healthcare providers to focus more on patient care. However, this could exacerbate existing inequalities if access to AI-powered tools is unevenly distributed, leaving underserved populations behind.

In conclusion, AI represents a powerful and transformative technology that holds immense promise while posing significant challenges. Its responsible development and deployment will determine its ultimate impact on society.

 

Sources:

https://meng.uic.edu/news-stories/ai-artificial-intelligence-what-is-the-definition-of-ai-and-how-does-ai-work/#:~:text=Artificial%20Intelligence%20(AI)%20works%20by,%2C%20perception%2C%20and%20language%20understanding.

https://mitsloan.mit.edu/ideas-made-to-matter/its-time-everyone-your-company-to-understand-generative-ai?utm_source=mitsloangooglep&utm_medium=cpc&utm_campaign=westermanGAI&gad_source=1&gclid=Cj0KCQiAgJa6BhCOARIsAMiL7V-hWe_pTrFavpDJq7c3UKSXnT9cn4C-dQW5h1NLU8RsLGeHS0s-ZEQaApxVEALw_wcB

https://www.insperity.com/blog/artificial-intelligence-ai-at-work-what-you-need-to-know/?pid=AdwordsWO_Search-TF-DSA&kw=&utm_source=google&utm_medium=cpc&utm_campaign=WO%20-%20Search%20-%20TF%20-%20HR%20DSA&cid=7014x000000QbJvAAK&customer_id=855-678-2386&gad_source=1&gclid=Cj0KCQiAgJa6BhCOARIsAMiL7V8acRbSq0idTSHsXyHenSXicPP4IpL3ERuP4HCsYJ2EicQL7BGOXkUaAtr1EALw_wcB

https://www.coursera.org/articles/history-of-ai

https://www.tableau.com/data-insights/ai/history

https://www.britannica.com/science/history-of-artificial-intelligence

https://library.icc.edu/c.php?g=1372140&p=10141462

https://www.ibm.com/topics/ai-ethics

https://www.coursera.org/articles/ai-ethics

https://www.balto.ai/blog/how-ai-already-impacts-our-lives-in-unforeseen-ways/?utm_term=&utm_campaign=(G)+Performance+Max&utm_source=adwords&utm_medium=ppc&hsa_acc=2743862643&hsa_cam=20003079310&hsa_grp=&hsa_ad=&hsa_src=x&hsa_tgt=&hsa_kw=&hsa_mt=&hsa_net=adwords&hsa_ver=3&gad_source=1&gclid=Cj0KCQiAgJa6BhCOARIsAMiL7V-vj6JBnMVnSgr8bniMWv5emQLdZHH5Rn88xEBPMit784tAfcxI5iYaAsZAEALw_wcB

https://www.foreseemed.com/artificial-intelligence-in-healthcare

https://pmc.ncbi.nlm.nih.gov/articles/PMC8285156/

https://health.clevelandclinic.org/ai-in-healthcare

https://www.pwc.com/gx/en/industries/healthcare/publications/ai-robotics-new-health/transforming-healthcare.html

 

Mobile Apps

For this blog post, the two apps I chose are Spotify and Instagram.

Spotify is a popular music streaming service that provides users with access to a vast library of songs, albums, and podcasts. It allows users to create and share playlists, follow artists, and discover new music based on their tastes. The platform’s primary use is for streaming audio content, allowing people to listen to music and podcasts without needing to purchase individual songs or albums. Spotify is available in both free and premium versions, with premium users enjoying ad-free listening, offline downloads, and higher audio quality. The target audience for Spotify is broad, appealing to music lovers across various age groups and demographics; however, it is particularly popular among younger generations, including teenagers and young adults who consume music on mobile devices and seek personalized music experiences.

Spotify generates revenue primarily through two streams: subscriptions and advertising. The free version is supported by ads, which allows Spotify to earn revenue from advertisers targeting their user base. Premium subscriptions, on the other hand, provide an ad-free experience in exchange for a monthly fee. For users looking to get the most out of Spotify, several tips and tricks can enhance their experience. One useful hack is to explore the “Discover Weekly” and “Release Radar” playlists, which Spotify curates weekly based on listening history. Additionally, users can download music for offline listening to save on data usage or use the “Private Session” mode to prevent certain songs from affecting their recommendations. Finally, for podcast listeners, speeding up or slowing down playback can help with time management, especially for long episodes. These tips can help users make the most of Spotify’s features and personalize their experience.

Instagram is a social media platform primarily used for sharing photos, videos, and Stories. It allows users to connect with friends, family, and public figures, as well as discover new content across various interests, from fashion and food to travel and entertainment. Through Instagram’s features—such as posts, Stories, Reels, and direct messaging—users can express themselves creatively, engage with followers, and build communities. The app is designed for visual storytelling and is especially popular among younger audiences, particularly millennials and Gen Z. Influencers, brands, and businesses also use Instagram as a major tool for connecting with their audiences, promoting products, and growing their reach online.

Instagram’s revenue primarily comes from advertising. Companies pay to place ads in users’ feeds, Stories, and Reels, targeting specific demographics based on interests and behavior. Sponsored content from influencers is another revenue source, as brands partner with popular users to promote products. For users looking to get the most out of Instagram, there are several tips and tricks to enhance their experience. For example, using hashtags strategically can increase visibility; users can explore trending hashtags or create a mix of popular and niche tags relevant to their content. Additionally, the “Close Friends” feature in Stories allows users to share more private content with a select group of followers. To keep a clean feed, users can also mute accounts instead of unfollowing them, which hides posts without notifying the account owner. These features can help users personalize their experience, engage effectively, and stay connected on Instagram.

Sources:

Instagram Revenue and Usage Statistics (2024)

Spotify Revenue and Usage Statistics (2024)

https://www.pcmag.com/how-to/spotify-tips-tricks-music-streaming

https://about.instagram.com/blog/tips-and-tricks

 

The Cloud

1. Google Drive
Google Drive is one of the most widely used cloud storage services, offering users a convenient way to store, share, and access files from any device with an internet connection. When you save a document, photo, or video on Google Drive, it’s stored on Google’s distributed network of servers instead of on your local device.

Would This Work as Well Outside the Cloud?
Not really. Without the cloud, Google Drive’s cross-device accessibility, collaboration features, and large storage capacity would be limited. You would have to save files locally on each device and manually transfer them between devices, which is both inconvenient and time-consuming.

Advantages of Google Drive Being in the Cloud
Accessibility: You can access your files from any device with an internet connection.
Collaboration: Google Drive makes it easy to share documents and collaborate with others in real-time, with changes appearing instantly for everyone with access.
Automatic Backup: Files stored in Google Drive are automatically backed up on Google’s servers, so you’re less likely to lose important documents if a device fails.
Security and Privacy Concerns
Storing files in the cloud means trusting Google to keep your data secure. While Google Drive offers encryption for files at rest and in transit, there’s always a potential risk of unauthorized access if your account is compromised. To mitigate this, it’s essential to use strong passwords and enable two-factor authentication.

2. Spotify
Spotify, the popular music streaming service, is a cloud-based application that you might use without realizing it. Instead of downloading music to your device, Spotify streams it directly from its servers, allowing you to access millions of songs instantly.

Would This Work as Well Outside the Cloud?
No. Without the cloud, Spotify would have to function as a local music library, requiring users to download every song they want to listen to. This would take up significant storage space and eliminate Spotify’s ability to instantly update its music library across millions of users.

Advantages of Spotify Being in the Cloud
Instant Access to Millions of Songs: Cloud storage allows Spotify to offer a massive, ever-expanding library of music without users needing to store it locally.
Seamless Updates: Spotify can quickly update its catalog, playlists, and user recommendations across all devices because everything is synced to the cloud.
Custom Playlists and Recommendations: Spotify’s cloud-based algorithms analyze user listening habits to provide personalized playlists and recommendations.
Security and Privacy Concerns
Spotify collects data about your listening habits, which it uses to make recommendations. While Spotify’s terms of service outline how your data is used, it’s still essential to understand the implications of sharing personal data with cloud services. Spotify’s encryption and privacy practices help secure your information, but it’s wise to check privacy settings and regularly review data permissions.


Understanding Social Media Demographics

Top Three Social Media Sites in 2022-2023
Based on global usage, the top three social media platforms in 2022-2023 were:

1. Facebook
2. YouTube
3. Instagram

These platforms maintained their popularity by offering users unique ways to engage, share, and connect with others.

How Each Social Media Platform Works and Why People Use It
Each of these top platforms serves different user needs and preferences:

Facebook: Launched in 2004, Facebook is a social networking site that allows users to connect with friends, family, and communities. Users can share updates, photos, videos, and links, making it popular for social sharing and community building. It’s widely used for news, entertainment, and staying in touch with people.

YouTube: As the world’s largest video-sharing platform, YouTube allows users to upload, view, and interact with videos on nearly any topic imaginable. It’s a popular choice for entertainment, tutorials, and educational content. Many people use it for news and media, music, and personal development.

Instagram: Known for its focus on visual content, Instagram allows users to share photos, videos, and stories. It’s favored for creative expression, especially through lifestyle, fashion, and travel content, making it a go-to for influencers, brands, and individuals alike.

What Are Demographics, and Why Are They Important in Social Media?
Demographics refer to statistical data about populations, including age, gender, location, income level, and other characteristics. In social media, understanding demographics is critical for marketers, content creators, and advertisers, as it allows them to target their messages and products more effectively. By identifying who is using each platform and how they use it, brands can create tailored strategies that resonate with their target audiences.

Key Demographics That Stand Out Among the Top Three Social Media Platforms
Each of these platforms has unique demographics that shape how people interact with them.

Facebook:

Gender: Globally, Facebook skews male (56.7%), while in the United States, more women (53.8%) use the platform.


Age: Facebook is widely used across age groups, but it’s especially popular among those aged 25-34, making up 25.7% of its user base. Older users are also active, with 10.6% over 65.


Country: India leads with 330 million users, followed by the United States with 180 million.


Device: Most users access Facebook via mobile devices.


YouTube:

Gender: Globally, YouTube skews slightly male, with 54.3% male users.


Age: Its most common age group is 25-34, representing 21.5% of its audience, while it also captures a large Gen Z and Millennial audience in the United States (50.6%).


Country: India has the largest YouTube audience, with the U.S. contributing the most traffic.


Generation: YouTube is particularly popular among Millennials and Gen Z, making it ideal for younger audiences.


Instagram:

Gender: Globally, Instagram’s gender distribution is nearly even (50.6% male, 49.4% female), though in the United States, it skews female (55.4%).


Age: Instagram’s largest age group is 25-34, followed closely by 18-24. Older age groups use the platform less, with 65+ being the smallest demographic.


Country: India has the most significant Instagram audience, followed by the United States and Brazil.


Income: Instagram has a broad appeal across income groups, with higher usage among those earning above $70,000 annually.

 

Average Time Spent on Each Platform
Social media usage varies across platforms:

Facebook: American users spend an average of 30.9 minutes per day on Facebook.
YouTube: Users typically spend about 45 minutes per day on YouTube, making it one of the most engaging platforms.
Instagram: Users spend an average of 29 minutes per day on Instagram, with younger audiences tending to engage even longer.
(Source: DataReportal, Hootsuite, and Statista)

Which Platform Is Growing the Fastest?
Currently, YouTube has experienced rapid growth, particularly in regions like India and among Gen Z and Millennial audiences. This growth can be attributed to the increasing demand for video content and the platform’s ability to host diverse, long-form content. As more creators flock to YouTube and the platform expands into shorts and live streaming, it continues to attract a younger, engaged audience looking for video content across various genres.

How Are Users Accessing These Platforms?
Mobile devices dominate as the primary mode of access:

Facebook: Most users access Facebook through their mobile devices, highlighting its convenience for on-the-go socializing.
YouTube: While YouTube is accessible on both mobile and desktop, mobile views are increasing, especially with the introduction of “YouTube Shorts.”
Instagram: Given Instagram’s image-focused format, it is almost exclusively used on mobile devices.

Cybersecurity

LockBit is one of the most notorious ransomware operations in recent years, responsible for numerous cyberattacks on businesses, healthcare providers, government agencies, and other critical sectors worldwide. First identified in 2019, LockBit operates as a Ransomware-as-a-Service (RaaS) model. This means that affiliates – external cybercriminals – can join the network, deploy the ransomware, and split profits with the developers. The operation is known for its sophisticated encryption methods and aggressive tactics, often threatening to leak stolen data if the ransom isn’t paid.

LockBit is an elusive criminal network, allegedly headquartered in Eastern Europe. Due to the decentralized nature of RaaS, it’s difficult to pin down exactly who leads the operation. While the developers create and maintain the ransomware, they rely on affiliates to carry out attacks. Some of LockBit’s most high-profile targets include companies such as Accenture, Royal Mail, and industrial manufacturers worldwide. The LockBit group has grown to become one of the largest ransomware collectives, reportedly accounting for nearly 40% of ransomware attacks in 2022.

A particularly concerning feature of LockBit is its focus on “double extortion.” Attackers not only encrypt a victim’s data but also steal it, threatening to release sensitive information on public forums if the ransom isn’t paid.

The impact of LockBit’s attacks has been severe. For instance, Royal Mail, the UK’s national postal service, was forced to suspend its international shipping operations for several weeks in early 2023 due to a LockBit ransomware attack. This disruption reportedly cost the company millions in lost revenue and damaged its reputation for reliable service. Similarly, Accenture, a global consulting giant, was attacked in 2021. Although the company downplayed the incident, reports indicated that a ransom of $50 million was demanded.

Victims of ransomware often suffer significant financial losses, including downtime, ransom payments, data recovery costs, and reputational harm. The psychological impact on organizations and employees is also considerable, with increased stress, lost productivity, and customer dissatisfaction.

Because ransomware gangs like LockBit operate in countries with weak or nonexistent cybersecurity laws, tracking and arresting the perpetrators has proven challenging. However, in November 2022, international law enforcement arrested Mikhail Matveev, a suspected member involved in LockBit and other ransomware groups. The FBI also offered rewards of up to $10 million for information leading to the arrest of LockBit’s leaders.

Despite some arrests, most of LockBit’s operators remain at large, and their network continues to operate. This shows the difficulty of dismantling such decentralized cybercriminal groups, as affiliates can continue spreading the ransomware even if a few members are captured.

There are several key takeaways from LockBit’s operations that both individuals and businesses can apply to prevent similar attacks:

  1. Regular Backups: Back up important data frequently and store it offline or in a secure cloud environment to ensure that encrypted files can be restored.
  2. Update Software and Systems: LockBit exploits vulnerabilities in outdated software. Ensure that all systems and software are patched and up-to-date.
  3. Employee Awareness and Training: Many ransomware attacks begin with phishing emails. Train employees to recognize suspicious emails and avoid clicking on unknown links or attachments.
  4. Use Multi-Factor Authentication (MFA): MFA adds an extra layer of security, making it harder for attackers to access networks even if passwords are compromised.
  5. Incident Response Plan: Develop and regularly test a cybersecurity response plan, so you can act quickly in the event of an attack.

In conclusion, the LockBit ransomware group highlights the evolving nature of cybercrime and the importance of proactive cybersecurity measures. Organizations must invest in robust security practices to protect themselves, as the consequences of falling victim to ransomware can be devastating. While law enforcement has had some success in identifying and arresting individual members, ransomware continues to be a significant threat, reinforcing the need for vigilance and preparedness.

 

Sources:

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a

https://www.kaspersky.com/resource-center/threats/lockbit-ransomware

https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/lockbit

 

Midterm Research Project: Privacy, Security, Hacks, and Leaks

Preventing and Managing Cyber Threats in a Gourmet Food Retail Business From the Perspective of a CIO

As the Chief Information Officer (CIO) of a gourmet food retailer with three stores and a growing e-commerce platform, I am acutely aware of the rising number of digital threats that pose risks to our business. With over 35,000 customers, $1 million in annual sales, and a team of over 100 employees, protecting sensitive customer information, corporate data, and operational systems is paramount. As we rely more on digital infrastructure, understanding potential threats and implementing robust defenses has never been more critical. In this blog post, I will outline key cyber threats, vulnerabilities within our systems, and strategic measures to mitigate these risks.

Know Your Enemy: 5 Sources of Potential Digital Threats

  1. External Hackers (Cybercriminals): Cybercriminals often target businesses like ours to steal customer data, credit card information, and corporate secrets. These actors use sophisticated tactics, such as phishing, malware, and ransomware, to compromise systems. For instance, a ransomware attack could encrypt all our customer and operational data, leaving us locked out unless we pay a ransom.
  2. Insider Threats (Malicious Employees): Internal employees, whether deliberately or inadvertently, can pose significant risks. A disgruntled employee could misuse access privileges to steal sensitive data, delete files, or leak customer information. Insider threats are often difficult to detect until the damage is done because these individuals have legitimate access to systems.
  3. Human Error (Unintentional Mistakes): Employees are one of the weakest links in any security chain. Simple errors like sending sensitive data to the wrong email address, clicking on a phishing link, or failing to update passwords regularly can result in breaches. For example, an employee accidentally downloading malware could give hackers access to critical systems.
  4. Supply Chain Vulnerabilities (Third-Party Vendors): Many businesses rely on third-party vendors for various services, such as payment processing, website hosting, and software support. If a vendor’s system is compromised, it can create a vulnerability in our organization’s network. For example, if our payment processor experiences a breach, hackers could gain access to our customers’ payment details.
  5. Distributed Denial of Service (DDoS) Attacks: DDoS attacks overwhelm a business’s website or network by flooding it with traffic, causing service disruptions. For an e-commerce platform, this means downtime, lost sales, and frustrated customers. Such attacks can be initiated by competitors or hacktivists to damage our reputation and bottom line.

Know Yourself: 5 Vulnerable Digital Processes and Systems

  1. E-Commerce Platform: Our online store handles customer data, payment processing, and order management. If security vulnerabilities exist in our platform, hackers could exploit them to steal credit card details or install malicious software that impacts our operations.
  2. Point-of-Sale (POS) Systems: In-store POS systems process transactions, collect customer payment information, and track inventory. These systems could be targeted by cybercriminals to skim credit card information or inject malware into the network.
  3. Customer Database: We store customer information, including names, email addresses, payment history, and delivery addresses. If our database is not encrypted or properly secured, it becomes an easy target for hackers aiming to steal valuable customer data.
  4. Corporate Email Systems: Our employees use email for internal communication, customer support, and vendor relations. Phishing attacks could compromise corporate email accounts, leading to unauthorized access to sensitive business information and potentially exposing customer data.
  5. Cloud Storage and Backup Systems: We use cloud storage for storing critical documents, product information, and backups of customer data. A poorly secured cloud infrastructure could be vulnerable to attacks, enabling hackers to access and steal valuable data or disrupt business continuity.

Develop Your Strategy: 5 Cybersecurity Recommendations

  1. Implement Multi-Factor Authentication (MFA): We should enforce MFA across all sensitive systems, including email, cloud storage, and the e-commerce platform. MFA adds an extra layer of protection by requiring users to provide two or more verification methods, such as a password and a temporary code sent to their phone.
  2. Encrypt All Customer and Corporate Data: Encrypting sensitive data, both at rest and in transit, is crucial. This ensures that even if a hacker gains access to our systems, they will not be able to read or use the data. We should also encrypt customer payment information and personal details to safeguard against breaches.
  3. Conduct Regular Employee Training: Human error is a major vulnerability, so we should provide ongoing cybersecurity training to all employees. Training should cover how to recognize phishing attempts, the importance of strong passwords, and secure file-sharing practices. Regular simulated phishing tests can help reinforce this knowledge.
  4. Strengthen Firewalls and Network Security: Our IT department should install robust firewalls and intrusion detection systems to monitor for unusual network activity. A properly configured firewall will block unauthorized access attempts, while intrusion detection systems can alert us to potential breaches in real-time, allowing us to take swift action.
  5. Develop and Test an Incident Response Plan: Cyberattacks are inevitable, so having a well-developed incident response plan is essential. This plan should outline the steps to take in the event of a breach, including how to contain the threat, notify affected customers, and recover lost data. Regularly testing the plan will ensure that all employees know their roles and can act quickly during an emergency.

In conclusion, the risks posed by cyber threats to our gourmet food retail business are significant, but with the right strategy and security measures, we can reduce our vulnerabilities. By staying vigilant, educating employees, and investing in modern security tools, we can protect our customers, employees, and our business from digitally-induced disasters.

 

 

Sources:

https://www.fbi.gov/investigate/cyber

https://www.interpol.int/en/Crimes/Cybercrime

https://usa.kaspersky.com/resource-center/threats/what-is-cybercrime

https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats

https://www.ibm.com/topics/insider-threats

https://www.cisa.gov/topics/physical-security/insider-threat-mitigation

https://www.dhs.gov/archive/science-and-technology/cybersecurity-insider-threat

https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches

https://www.infosecinstitute.com/resources/security-awareness/human-error-responsible-data-breaches/

https://www.bitsight.com/glossary/third-party-cyber-risk#:~:text=Third%2Dparty%20cyber%20risk%20is,each%20vendor’s%20own%20cybersecurity%20measures.

https://www.upguard.com/blog/what-is-third-party-risk

https://www.metomic.io/resource-centre/third-party-risk-in-cyber-security

https://www.bitsight.com/glossary/how-to-mitigate-third-party-risk

https://www.microsoft.com/en-us/security/business/security-101/what-is-a-ddos-attack?&ef_id=_k_CjwKCAjwmaO4BhAhEiwA5p4YL_PJ5BFtoXe7rNwUrkIPSwtIHzg_KYzDkDEgdEaXBtn6hwaE1LOufxoC2BoQAvD_BwE_k_&OCID=AIDcmmdamuj0pc_SEM__k_CjwKCAjwmaO4BhAhEiwA5p4YL_PJ5BFtoXe7rNwUrkIPSwtIHzg_KYzDkDEgdEaXBtn6hwaE1LOufxoC2BoQAvD_BwE_k_&gad_source=1&gclid=CjwKCAjwmaO4BhAhEiwA5p4YL_PJ5BFtoXe7rNwUrkIPSwtIHzg_KYzDkDEgdEaXBtn6hwaE1LOufxoC2BoQAvD_BwE

https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/

https://www.dhs.gov/archive/science-and-technology/ddosd

https://www.ncsc.gov.uk/collection/denial-service-dos-guidance-collection

https://www.cisa.gov/news-events/news/understanding-denial-service-attacks

https://aws.amazon.com/what-is/mfa/

https://www.okta.com/resources/whitepaper/8-steps-for-effectively-deploying-mfa/

https://www.cisa.gov/MFA

 

Digital Media Design: Where can you turn for help?

I conducted a Google search to find techniques for removing an object from a photo in Photoshop. The article I referenced was published in 2019, which may make some of its information slightly outdated. 

However, here is how to remove an object from a photo in Photoshop, using both the information found in the article, and what I already knew.

To remove an object from a photo in Photoshop, you can use several tools depending on the complexity of the image, but a simple and effective method is to use Content-Aware Fill. Start by selecting the object using the Lasso Tool or any other selection tool like the Marquee or Quick Selection Tool. Once the object is selected, go to Edit > Fill, and in the dialog box, choose Content-Aware from the dropdown menu. When you press OK, Photoshop will analyze the surrounding pixels and automatically fill in the selected area, blending it with the background to remove the object. After that, you can press Ctrl+D (or Command+D on Mac) to deselect the selection.

If the result isn’t perfect, you can clean it up using the Clone Stamp Tool or Healing Brush Tool. The Clone Stamp Tool allows you to manually paint over the removed object by sampling nearby areas and blending them in. You can select a source area by holding Alt (or Option on Mac) and clicking, then paint over the remaining traces of the object. Similarly, the Healing Brush Tool blends the sampled area into the background more smoothly, making it ideal for removing minor imperfections or blemishes.

Another useful tool for object removal is the Patch Tool. With the Patch Tool, you can draw a selection around the object, then drag the selection to a clean area of the image. Photoshop will use that clean area to replace the object while blending the textures naturally.

Once the object is removed, zoom in to ensure that the fill is seamless and there are no leftover edges or artifacts. You can further refine the area using the Blur Tool or adjustment layers to blend shadows and lighting.

 

The source was somewhat helpful; it provided clear instructions and was relatively well-written and easy to follow. However, I found it lacking in detail and not as informative as I had hoped. In fact, most of the information I shared here was what I already knew.

 

Source:

How to Remove Unwanted Objects Using Photoshop

Content Management Systems

What is a content management system, or CMS? A Content Management System, or CMS, is a software platform that enables users to create, manage, and modify digital content on websites without needing extensive technical knowledge. It provides an intuitive interface for organizing and updating content like text, images, and videos, often through drag-and-drop or simple form-based controls. CMS platforms typically include features such as user role management, content scheduling, and templates for consistent design. Popular examples include WordPress, Wix, Joomla, and Drupal, which allow users to focus on content creation while the system handles backend functions like website structure, security, and performance.

Is CMS or HTML better? What are the benefits and drawbacks of each? What is the current best practice when it comes to making a website? Well, let’s compare. HTML, or Hypertext Markup Language, and Content Management Systems, or CMS, serve different roles in web development. HTML is a markup language used to structure and display content on web pages, requiring knowledge of coding and web design to manually build and maintain websites. It offers full control over the layout and functionality of a site, but can be time-consuming and complex, especially for non-technical users. In contrast, a CMS simplifies website creation by providing an interface for users to manage content without needing to write code. With built-in templates, plugins, and easy content management, CMS platforms like WordPress streamline the process, though they may offer less customization flexibility compared to building from scratch with HTML. Essentially, HTML is foundational for web design, while a CMS is a user-friendly tool that abstracts much of the technical work. Furthermore, CMS is better for those without technical skills, but is more expensive in the long run. HTML supports all browsers in the world, which cannot be said for CMS. However, changing designs can be easier in a CMS than an HTML. On the other hand, HTMLs are completely customizable and you have complete control over your website’s design and functionality. HTML is also faster and more lightweight than CMS. Overall, despite the fact that some may argue that CMS is better, in my opinion, HTML is better.

How do CMSs impact the web design industry? Are they taking away jobs from web developers? Content Management Systems, or CMS, have significantly transformed the web industry by making website creation and management accessible to a broader audience. They have reduced the dependency on professional developers for routine updates, enabling businesses, individuals, and organizations to easily create and maintain websites without deep technical expertise. This democratization has led to an explosion of web content and small business websites, fueling the growth of the digital economy. CMS platforms streamline workflows with features like templates, plugins, and integrations, speeding up development and improving scalability. As a result, the industry has shifted focus from manual coding to optimizing user experiences, content strategies, and search engine optimization, or SEO, allowing more innovation and creativity in how websites serve users.

 

Sources:

https://www.wix.com/studio/blog/what-is-a-cms-in-web-design?utm_source=google&utm_medium=cpc&utm_campaign=20954991244^160638040249^search%20-%20us&experiment_id=^^689640761938^&gad_source=1&gclid=CjwKCAjw9eO3BhBNEiwAoc0-jQiR2chAycuO0JhhxrbC1KXJGP4VUQ-oyvM80qRMfuWM0sP9AYiRnxoCXWUQAvD_BwE

https://www.coredna.com/blogs/cms-vs-html#:~:text=Besides%20overhauling%20the%20design%20of,design%20changes%20are%20more%20difficult.

https://www.geeksforgeeks.org/html-vs-cms-which-is-right-for-your-website/

https://www.ramotion.com/blog/what-is-cms-in-web-design/#:~:text=In%20web%20design%2C%20the%20role,not%20the%20other%20way%20around.

Recent Evolution of the Web


1. Today, do more people access the web using computers or mobile devices? Provide a resource that supports your answer.
Most people use mobile devices to access the internet. According to thriveagency.com, 56.8% of internet users use mobile devices and 53.2% of internet users use desktops or computers. 95.3% of internet users will use any mobile phone to access the internet, 94.4% will use a smartphone. 63.4% will use any laptop or desktop, and 57.9% will use a personal laptop or desktop.

Source:

https://thriveagency.com/news/75-mobile-surfing-stats-on-internet-traffic-from-mobile-devices-updated/#:~:text=95.8%25%20use%20mobile%20phones%20to,desktops%20(Source%3A%20Statista).&text=4.,2021%20(Source%3A%20Statista).


2 . Who controls the World Wide Web? What is it made up of?
No one owns the WWW. But everyone has the right to use it. The WWW is a space where anyone in the world can visit websites. No single person or organization controls the internet everywhere, however, many countries control what websites their citizens can visit.

Source:

https://www.elitegroup.com/resorces/blogs/who-owns-the-internet/

3. Who is Tim Berners Lee? What is he best known for?
Tim Berners Lee is a British computer scientist, generally credited as the inventor of the World Wide Web. Tim Berners Lee combined hypertext with the internet to make the WWW.

Sources:

https://www.elitegroup.com/resources/blogs/who-owns-the-internet/

https://www.britannica.com/biography/Tim-Berners-Lee

4. What is a blog? What is it used for?
A blog is what this is- a website or web page, typically one run by an individual or small group, that is written in an informal or conversational style. At their inception, blogs were simply an online diary where people could keep a log about their daily lives on the web. They have since morphed into an essential forum for individuals and businesses alike to share information and updates.

Source: The Oxford Dictionary

https://www.wix.com/blog/what-is-a-blog#:~:text=Blogs%20are%20a%20type%20of,daily%20lives%20on%20the%20web.

5. What is a “responsive” website design?
Responsive web design means the website responds to the user’s behavior and environment, such as size of screen, platform being used, and orientation of screen.

Source:

https://www.smashingmagazine.com/2011/01/guidelines-for-responsive-web-design/

 

6. Why are “responsive” website designs necessary?

Responsive website designs are necessary because they made the website more user friendly, whether that user is on mobile or desktop. So, it makes it more accessible for everyone and makes it easier to use.

Source:

https://www.webfx.com/web-design/learn/why-responsive-design-important/#:~:text=Responsive%20design%20can%20help%20you,your%20rankings%20in%20search%20engines.


7. What is SEO, and why should website owners/managers be concerned with SEO?

SEO stands for Search Engine Optimization. Website owners and managers should be concerned with it because it helps websites rank higher in search engine results pages.

Source:

https://searchengineland.com/guide/what-is-seo

8. What is dynamic content?
Dynamic content is any digital or online content that changes based on data, user behavior, and preferences. 

Source:

https://www.spiceworks.com/marketing/content-marketing/articles/what-is-dynamic-content-definition-types-strategy-best-practices-with-examples/


9. What is a content management system? You work with one, what is it’s name?

A content management system (CMS) is a software application that helps users create, organize, and manage digital content. For example, WordPress is a CMS.

Source:

https://www.ibm.com/topics/content-management-system



10. What is a YouTube channel? Who might want to start one?

A YouTube channel is a personalized  place to post videos and share information. Anyone who might want to share videos or information, such as a business, might want to start one.

Source:

https://www.lifewire.com/channel-youtube-1616635

 

Introduction

Hi, I’m Meralyse.

20240304_162100.jpg

I am a Graphic Design and Web Design major. In my free time, I like to write, play video games, and listen to music.

Music wise, I really love the Eagles, Fleetwood Mac, Led Zeppelin, Def Leppard, AC/DC, Aerosmith, Genesis, Pink Floyd, basically all the oldies rock bands.

Video games wise, I play Civ VI, The Sims, Animal Crossing, Stardew Valley, FaeFarm, Disney Dreamlight Valley, Pokemon, Mario, Hogwarts Legacy, and Skyrim. I have a Switch for most of these games, however I play Civ and Sims on my laptop and have several apps on my tablet I enjoy.

Writing wise, I write YA novels and poetry.

I have a wonderful fiancé, James, who is a robotics engineer and he brings much joy and laughter into my life, and who I love to take artsy pictures of.

20231123_111330 (1)-2.jpg20230708_174307~2.jpg20240224_145954.jpg

 

I also have two older brothers, Andre and William, who are the biggest goofballs, and the most fantastic mom and the funniest dad, and two amazing sisters-in-law.

FB_IMG_1658762970755-1.jpg

 

And I have a 4-year-old nephew (5 in November) named Milo, who is my little buddy and I didn’t know it was possible to love a kid that isn’t your own this much.

20240729_155749.jpg

 

And, finally, shout out to my BFF, Katie.

Screenshot_20240708_112447_Photos.jpg

 

My career goals are to be a freelance designer and a well-known author, and to create artwork for my books, as well as make merchandise for businesses as a freelance designer.

I think that’s enough for now.