What’s Next – Future Tech Review

AI is an emerging cutting-edge technology. AI stands for artificial intelligence. This refers to something artificial (other than human) that has its own intelligence. In this case, AI is computer software made of algorithms. AI has a set of rules that it uses to make an intelligent choice of resources. AI also has the ability to learn when it has to perform more tasks. Nowadays, AI is becoming increasingly available to the public.

The first concept of artificial intelligence was developed in 1955 by Allen Newell, Cliff Shaw, and Herbert Simon called The Logic Theorist. This made the thought of having an artificial intelligence program possible. From there the progression of artificial intelligence became more and more advanced.

Artificial intelligence is a good resource for users. It creates a source of information at can be generated at a high quality. Previously, the quality of information that is generated by AI was only sought out by experts. Having AI in mainstream technology helps users generate high-quality information.

Artificial intelligence is a good resource. However, there are some drawbacks to using this software. One of these would be loss of jobs. AI has now been powering machines such as manufacturing machines. This causes a significant threat to people who are in the manufacturing industry. With computers doing the jobs of previous labor workers, there is a risk that AI will do the job alone and leave workers without jobs.

Artificial intelligence is set to impact our society. With it being so easily accessible, users are able to access it wherever they are. Things such as chat robots give users information about a topic that they want. The emerging technology keeps evolving. We already have things like driverless cars and language translators. The future of technology may continue to evolve to the point where people are using AI for everyday tasks.

Source 1
Source 2
Source 3

Mobile Apps

Two popular mobile apps today are TikTok and YouTube. These mobile apps are both video-sharing apps that have similar features. Both of the apps allow users to watch videos that are short in length (>30 seconds to 10 minutes). YouTube additionally allows users to watch videos that are longer in length in addition to the short videos they call “shorts”. On TikTok, these videos appear on the “For You” page. This page is custom to the user demographic. Users see the videos as they scroll through the page whereas on YouTube users have to click on these videos.

The apps also have a sequential target audience. On TikTok, the target audience age is between 18 and 25 years old. Similarly, YouTube’s target audience age is between 25 to 35.

Publishers of videos can earn revenue on both apps. On TikTok, publishers are paid according to the view count. TikTok will pay publishers $0.02 and $0.04 per 1,000 views. So if a view gets 1 million views the publisher will earn $20 to $40. However, on YouTube publishers are paid according to revenue generated and view counts. Publishers on YouTube earn 55% of the revenue their video makes and an additional $0.018 per 1,000 views. For example, the video generates $100 and 1,000 views, the publisher will earn $73.

Both of these apps are things I use frequently. There are many ways to get the most out of the apps. One thing I suggest is when you find a video you enjoy, like it. These platforms are made with a program that is curated to videos you enjoy and the way to get enjoyable videos is to show the apps what you like.

Sources

Source 1

Source 2

Source 3

Source 4

The Cloud

One cloud-based service that I use is Google Drive. Google Drive is a place to store files and has synchronization services. Google Drive lets users store files in the cloud. This service would not work as well if it was not used in the cloud because the cloud is responsible for storing all of the files on the program. Some advantages of this program being on a distributed network would be that it can be accessed from other devices, and it would be easy to share files with others. There are some concerns about using this cloud-based service is that all of the files are in one place. If a hacker were to gain access to the user’s password and information, they would have access to all of the user’s personal files. The cloud makes it easy to access other files on Google’s programs such as docs, slides, and sheets. This feature makes it easy for users to access files easily.

Another cloud-based service I use is Zoom. Zoom is a service that allows users to use video and audio conferencing through a computer. The program allows users to record the meeting so it can be watched at a later time. This program would not work well not on the cloud because it would not be able to store all the files in one place. Some advantages to having this program on a distrusted network are faster performance and latency. If there were multiple computing networks then joining, saving, and connections would work at a faster speed. When downloading the recording to computers having a distributed network would make the downloading faster. Some concerns of using this cloud-based program are that it would be easy for hackers to access the meeting recordings and the latency would be slower.

Sources
25 Top Cloud Computing Examples to Know | Built In
What is Distributed Computing, its Pros and Cons — IT Companies Network

Social Media Demographics

Q; What were the top three social media sites, in terms of traffic, in 22-23? Listed in order of popularity.

A: As of October 22, 2023, the top three social media sites, in terms of traffic, are;

1: Facebook (2.89 billion monthly users)

2: YouTube (2.3 billion monthly users)

3: WhatsApp (2 billion monthly users)

Source

Q; Provide a brief summary of how each social media site works and why people use it.

A: Facebook works by allowing users to create a profile to connect with others. Users upload optional information about themselves so others can find them. When a user finds someone, they know they send them a friend request. After someone is friends, they can view each other’s profiles and posts. Most people use Facebook to show others what they are doing. To do this they can make a post, which includes pictures and text, and their friends will see what they up too.

YouTube works by allowing users to create and post videos. When someone posts on YouTube, they can choose to make their video public (viewable to everyone), private (viewable to just the poster), or unlisted (viewable to people with a link to the video). On YouTube there are many people who have a wide audience of viewers. YouTube allows users to follow anyone with videos that you like. There are many different categories of what someone can watch on the site. Some of these are gaming, entertainment, and educational. 

WhatsApp allows users to make message others through their cellular or Wi-Fi connection. WhatsApp was made to replace the build-in messaging system in cell phones and replace them with something that does not have any limitations. Users join by confirming their mobile number. By searching for others by their phone numbers, users can contact one another. 

Q; What are “demographics” and why is it important in social media?

A: Demographics are characteristics of the population that can be categorized. For example, race, gender, and income. These are important to social media because it gives an idea of what our viewers want to see. When looking at demographics you should decide things like what social media platform to use and what to market. When we use the demographics to promote what the viewers want to see, your market will take off.

Q; Explain any demographics that stand out among the three social media sites you listed above. (More popular with a specific age group, are majority of users male or female, married or single, employees or self-employed, etc.)

A: Facebooks demographics are mostly used by people that are male (56%) rather than female (44%). Along with being mostly used by men, Facebooks average age of its users are 25-34 (29.9%). 

YouTube demographics is mostly used females (51.4%) rather than males (48.6%). Along with being mostly used by women, Facebooks average age of its users are 15-35 (29.9%). India has the most YouTube users around the globe. 

WhatsApp is used mostly by people aged 26-35 (27%). Of the people that use WhatsApp the majority of them are male (53.9%), with females being (46.1%). India uses WhatsApp more than any other country.

Q; On average, how much time do users spend on each social media site during a day, week or month? Provide a resource that supports your answer.

A: Facebook users spend an average of 30 minutes per day on this site (Source).

WhatsApp users spend an average of 17 hours a month on the site (Source).

Facebook users spend an average of 45.6 minutes per day on this site (Source).

Q; Which of the three social media networks is growing the fastest? Why do you think that is?

A: YouTube is the fastest growing network out of the three listed social media sites. I believe that this is because it has a very high amount of time spent daily, which contributes to its growth. Along side the daily amount of usage, the new generations are starting to engage in social media sites. They are interested in the new YouTube shorts feature which helps YouTube further their time spent in the app. 

Q; How are the majority of visitors accessing these three sites (computer, mobile device, tablet)?

A: The majority of Facebook users (98%) access the site through a mobile device, along with WhatsApp, and YouTube (40%). 

Cybersecurity

In October of 2023, a hacker tapped into the network of 23andMe and leaked 14 million pieces of data. The hacker used previously leaked username and password combinations to get into user’s accounts. They then used the user’s DNA Relatives feature to find other users and compile information about them. The DNA Relatives feature allows users to see their relative’s basic profile information. With this, they found little amounts of information to figure out the passwords of the users. Most of the information gathered was about users who are Jewish. The hackers posted in an online discussion that they were willing to sell the information about the user’s location, names, ethnicities, and other private information. They specifically were interested in selling the Jewish user’s information.

They also found other databases that contained information about users of other ethnicities. On one database, there was information about 1 million users of Ashkenazi heritage. Another contained 300,000 users of Chinese heritage. The hackers contained information about these users that included things like account numbers, birth year, data on whether or not each user has opted into 23andme’s health data, and more sensitive information. Sharing the account numbers of users allows people who know the ID number to view the user’s profile containing the user’s photo, name, birth year, and location.

The CEO of 23andMe put out a statement on Friday the 20th, stating that they were aware of the breach 2 months earlier, but never revealed the information to the public. They confirmed in an email that the private information of some of their users was up for sale. They claimed that there is no evidence that the leak came inside the 23andMe systems. They said that the hackers most likely used a technique called “credential stuffing”. Credential stuffing is when hackers use password and username combinations from other sites and plug it into other sites to try and obtain personal information.

The company started working with digital forensic experts and law enforcement to decide what to do about the situation. The company has since required all of their users to change their password to continue to try and keep users’ private information safe. Since the leak, 23andMe has closed 1% of their stocks. Users have been removing their private information from the website to ensure that their information will not be sold to the public. The hackers have not been found yet.

To ensure that this does not happen to us some things we can do is use unique passwords and set up two-factor authorization. If a hacker discovers your password on another site, they will not be able to access your accounts on others. Two-factor authorization will further help to ensure that your private information remains private. This will ensure that you are the one logging into your account and not a hacker.

Source 1
Source 2
Source 3
Source 4

Privacy, Security, Hacks, and Leaks

Know Your Enemy:

The online world is full of digital threats. Some can be outside factors, and some can be internal. Some internal threats to organizations are using unauthorized devices and stolen property. Using an unauthorized device to access company networks can open the door to external security threats. When the door is opened to external threats it makes it easy for a hacker to get into the network and steal sensitive information. Another internal threat is stolen property. This can happen when an employee leaves a work device somewhere where a member outside of their organization can obtain it. This poses a severe threat to the organization because an outsider can access the organization’s personal information from their own computers. Some external factors include things such as the Internet of Things, phishing, and brute force attacks. The Internet of Things includes things like weak passwords and a lack of patching. These weak spots make it easy for hackers to get into the social networking of the company. Going off of the Internet of Things, brute force attacks access companies’ networks through weak passwords using brute force tools (e.g., Hashcat, L0phtCrack, or Aircrack-ng). These tools guess the company’s passwords to get inside of the network. Another external threat would be phishing. Phishing is when an outside hacker sends an email to a company that looks like it is from a professional organization. Hackers do this with the goal of obtaining sensitive information.

Know Yourself:

Some things I do that I have in place are strong passwords, secure devices, checking the senders address, keeping devices in the workplace whenever possible, and having a clearly defined cyber security program. Having strong passwords makes it harder for someone or something to guess our passwords. However, using brute force tools to get into our network’s. Having secure devices is good for our company because it will prevent unsecure devices from getting into our network. Nevertheless, a friend may bring an unsecure device into our network without our knowledge that can give hackers access to our network. Another thing we do is check the sender’s address. We always make sure that we know the sender’s organization and it is not a hacker. Even though I double check the sender address, there is always a risk of a human error that gives a hacker sensitive information. Keeping devices in the home when possible is a good way to keep track of them and make sure they don’t get stolen. On the other hand, when I need to take the device out of the workplace there is always the threat that the device will be stolen. Finally having a clearly defined cyber security program ensures that all I know the best practices of cyber security. Despite knowing the best practices, I could still make a bad cyber security decision.

Develop Your Strategy:

There are some new practices and services that may be good to improve cyber security of my devices. One of these is abiding by the principle of least privilege. This means that I would give my friends and family the least amount of access needed to get on the network so that there is no human error that can give way to hackers. One more thing we should do is apply released patches and updates immediately. This makes sure that hackers do not find the weak spot in my websites that can lead to obtaining sensitive information. Another thing I should do is implement multi-factor authentication. This ensures that if hackers discover my password, they will not be able to get past the other authenticator. Again, another thing that I should do is establish a strictly enforced policy for mobile devices. This will make sure that there are no unauthorized devices on my network. Finally, we should minimize attack surfaces via microsegmentation. This would ensure that if hackers get into my network they will only get into a small portion of the network.

Top Cyber Security Threats to Organizations | CIO Insight

Where To Turn for Help?

Often, digital media designers have a problem that they don’t know how to fix. Nowadays, the internet is a very good place to find information. When trying to find information there are many things to consider. Some of these are credibility, currency, and quality. When all of these needs are met, the information is reliable and a good source to use. 

Adobe Tutorials

This link above is a good example of a place to find information about how to complete a needed task. All of the information that Adobe provides is updated frequently. As they update the programs, they also update the tutorials. The people who post the information are people who work at Adobe. These people are professionals in their field. To be hired at Adobe, workers must have a vast previous knowledge of design and information technology. Adobe does not use any form of gatekeeping mechanisms. The information is always clear and easy to follow. The website uses step-by-step instructions to help users understand the information. This resource will be helpful in the future in case I need to find out more information about a topic.

W3Schools

This website is a good place to turn to for coding knowledge. The website is updated occasionally as coding normally doesn’t change. It is unclear who is exactly who is posting the information but the website claims that it is a member of their team. The website uses advertising as a gatekeeping method. They chose to promote companies like HP and Breezeline. The quality of the information is easy to follow and gives the base codes which users then can fill with their own information. This is a website that I have previously used and may use in the future.

Creative Pro on YouTube

This YouTube channel is very helpful to understanding different programs. The channel is updated frequently. The oldest video on the channel is 5 years old. The CreativePro team are highly experienced in the design field. They post credible information that is easy to understand and follow. However, their YouTube channel uses multiple methods of gatekeeping. Some of these are algorithms, social media, and filter bubbles. I will use this YouTube channel in the future when I need a visually tutorial.

Content Management Systems

A content management system is software that can be used to make, edit, and manage content for a website without needing coding knowledge. Content management systems are built with pre-designed themes, templates, and plugins. This allows users to easily create a website. A content management system is mainly used for website content including blogs and e-commerce sites. A content management system makes it easy for users to create a website without having to learn the technical skills that were previously needed.

Before content management systems were invented, users had to learn how to code to make a website. The development of content management systems has made website building quicker and easier. When coding users have to use HTML and CSS to code a website that works and is easy for viewers to use. This can take a very long time to do as you have to input every variable that is evident on the website. Coding also requires a set of technical skills and knowledge of codes to create a finished website. Content management systems make it easy to make a website from scratch in a short amount of time without having to have any coding knowledge. However, a website made with HTML and CSS can be more complex and detailed than a website designed with a content management system. There are many advantages and disadvantages of using a content management system. Currently, content management systems are being used more than HTML and CSS.

Content management systems have impacted the web design world. It allowed for more websites emerging on the internet. As a result, there was more communication and interaction on the internet. Although there are more websites on the internet thanks to content management systems, web designers have not been impacted by the software. Content management systems are mostly used my content creators. This means that web designers are still very much needed in the design industry.

Sources

What Is a Content Management System (CMS)? (kinsta.com)

what does cms mean in web design – Li Creative (licreativetechnologies.com)

 

Evolution of the Web

Q: Do more people access the internet through a mobile device or a desktop?

A: 49.78% of internet users access the internet through mobile devices while 50.32% of users use a desktop. 

Who Owns The Internet? The Answer is No One and Everyone (elitegroup.com)

 

Q: What is the World Wide Web made of? Who controls it?

A: The World Wide Web is made of networks that all connect to each other. No one person controls the World Wide Web. Bits and pieces are owned by companies or individuals. The internet is a concept and no one company can claim it.  

What is the internet? – BBC Bitesize
51 Mobile vs. Desktop Usage Statistics For 2023 (techjury.net)

 

Q: Who is Tim Berners Lee? What is he best known for?

A: Tims Berners Lee is a British computer scientist. He is credited for creating the internet. 

Tim Berners-Lee | Biography, Education, Internet, Contributions, & Facts | Britannica

 

Q: What is a blog? What is it used for?

A: Blogs are websites that inform people about a certain topic regularly. The word blog is a mix of the words “web” and “log”. So, a blog is basically an online diary! Blogs are used to share information about a certain topic or organization, which can be helpful for businesses.  

What is a blog? Definition, types, benefits and why you need one (wix.com)

 

Q: What is a “responsive” website design?

A: A responsive web design is a website that will look good on all devices. For example, a website that is accessed through a desktop will be more spread out than when accessed on a mobile device. 

Responsive Web Design Introduction (w3schools.com)

 

Q: Why are “responsive” website designs necessary?

A: Responsive website design is important because it makes the website mobile friendly. When a website is mobile friendly a visitor may spend more time on your website. This is important because it will boost the website in search engines. 

Why is Responsive Design So Important? (webfx.com)

 

Q: What is SEO, and why should website owners/managers be concerned with SEO?

A: SEO stands for search engine optimization. SEO is basically when someone improves their website to make it more accessible in search engines. Website managers should be concerned about SEO because search engines will give better results before a weaker one. So, when a website is underdeveloped, it is more likely to get less traffic and be pushed down by search engines. 

What Is SEO And Why Is It Important? (reliablesoft.net)

 

Q: What is dynamic content?

A: Dynamic content when a website changes its content based on the preferences and behavior of the user. The dynamic content changes the website the moment it is opened. For example, a weather website uses the user’s locational data to engage the user. 

What is Dynamic Content? Definition & Examples- Omniconvert

 

Q: What is a content management system? You work with one, what is it’s name?

A: A content management system is the process of creating digital content. Digital content refers to all things that someone can find online. Content management systems are frequently referred to as CMS. There are multiple types of content management systems. Some of the websites that can help with that are WordPress, Wix, and Squarespace.

What Is a Content Management System (CMS)? [2023 Guide] | Semrush

 

Q: What is a YouTube channel? Who might want to start one?

A: A YouTube channel is basically a YouTube account. When you sign up for YouTube the website assigns you your own channel. Just like other apps such as Instagram, Twitter, or Facebook, YouTube allows users to post digital content. Unlike the other apps YouTube is mainly used to share videos. Companies and individuals may want to start a YouTube channel to build a following and build their business. 

How To Start a YouTube Channel (Plus Benefits and Tips) | Indeed.com

 

About Me

My name is Orissa Humes and I am a CCP student, attending COTC, from Mount Vernon High School. It is my senior year of high school and I am in my final two semesters of college. I am trying to get my associate’s degree in digital media this year alongside my high school diploma. I want to get my associate’s degree to build an application to a college out of state. It will also help me get a job while in college to pay for school. I choose this degree because I am passionate about digital media and want to learn more.

I am an only child besides our animals. I have 3 cats named Patches, Mr. Grey, and Stoney. I also have an 8-month-old lab mix puppy named Mabel. Although she is only eight months old, she already weighs 80 pounds. I also have pigs. I enjoy all the chores and care that come with the pigs. I breed pigs and then 6 months later I take the babies to the fair. We just had three litters of pigs at the beginning of August. We have a total of 19 pigs in our barn right now.

I take the pigs through a program at my high school called FFA. The program is very similar to 4-H. It teaches leadership and career success. Through this program, I have taken on the role of reporter for the past three years. My job as the reporter is to write news articles and post on our chapter’s social media. I earned the state degree in the organization in May. The degree is a high honor in our organization, less than 2% of members obtain this degree  (1 in 581 members).