AI | Future or Foe?

Artificial Intelligence has been the inspiration for many works of fiction all throughout the ages, sometimes as a helping hand or overlord of a dystopian nightmare. Recently though, AI has become a real thing. There is great potential for it to help humanity greatly. But what is Artificial Intelligence anyways? And is it too risky to use?
Artificial Intelligence works by feeding sets of data into an algorithm. After a round of processing data, the algorithm checks its performance. It learns what is the best method to complete a goal set by the programmers from its experience. Data could be every possible scenario for a game of checkers, or it could be images of bread. The AI eventually figures out the worst moves in chess, and the precise differences between images of white and brown bread. The machine learning process of AI can be very resource intensive and it is important to have the right hardware. Lots of RAM, CPU, and GPU are necessary. Thousands of scenarios and equations could be running in just seconds!
In 1956, Allen Newell, Cliff Shaw, and Herbert Simon managed to create an artificial intelligence program called Logic Theorist. Many consider Logic Theorist the first AI. It was designed to mimic human problem-solving skills and could solve symbolic logic equations. Logic Theorist inspired AI research to come.
Machine learning can solve many issues for us. In a short amount of time, an AI can learn how to identify and differentiate similar objects. It can see very subtle differences and patterns much better than humans can. For example, AI’s have been taught to recognize emotional tone in speech, cancer cells vs healthy cells, and human faces from all angles. Some AI can also suggest the best possible outcomes to scenarios and calculate future financial expenses. Imagine all of the great things that this could be put to use for.
Ignoring people who worry about AI’s developing emotions or becoming the next Skynet, there are many valid concerns about the implementation of AI in critical situations. What would happen if a constantly learning AI that holds serious power finds an unorthodox solution to a problem? It solves the problem alright, but it causes larger issues. It can be difficult to shape an AI to solve complicated issues exactly how we want it to. They can be unpredictable. And what if it is fed questionable statistics and develops a bias? Black New Yorkers get stopped by police twice as often as white people. An AI could associate race with crime. For now, putting moral tasks in the hand of AI is too risky.
But even in simple ways, AI’s prove to be beneficial. Consider advanced AI flawlessly diagnosing patients, prescribing exactly the right medicine. AI-aided trafficlights, learning the patterns of traffic, viewing the road, and reacting accordingly so no car has to wait longer than it needs to. We have a long way to go, but in the end, AI can benefit us a lot.

RESOURCES vvv

Continue reading

2 Popular Mobile Apps | CapCut & Amazon Kindle

CapCut is a simple mobile video editing application intended mostly for short-form content. It has the basic functions of most video editing apps, such as cutting and color grading, with extra features such as filters and stickers. Its user base consists of people making videos casually. It is well-liked by teens and older kids due to how simple it is to use. With fun filters, free-to-use music, and more included in the application, it is made with creating sharable content in mind. With over 250 million downloads, CapCut is considered one of the most popular video editing applications.
CapCut is free to use and does not display any advertisements. Its existence is advertising in itself, as its revenue comes from partnerships and licensing deals with other companies. They pay for their music and other features to be available in the app.
One thing to take note of is that CapCut is a simple mobile app and it is not meant for large projects. Even something over two minutes can make the app lag on some phones and export times can skyrocket. It is a good idea to keep it simple by dividing projects into parts that you can connect together again, or choosing a hardier desktop application.

Amazon Kindle is a mainly mobile application where you can purchase, download, and read ebooks and listen to audiobooks as well. (Not to be mixed up with Amazon’s tablet device under the same name!) You can grow your own digital library of free or paid books. You also have the ability to highlight, bookmark, and write notes about the text and images, among many others features. Anyone who can select a book and tap to turn a page can enjoy this application as Amazon’s almost endless selection of ebooks make finding something anyone could enjoy easy.
Its revenue comes from sharing the income of the authors who give their ebooks to Amazon to be read. Depending on the price of the book, Amazon can claim around 70 to 30 percent of the revenue. It is essentially a publishing company for digital media. It also earns money from being paid to promote certain books.
Something very good to know is that you can also install the Amazon Kindle Reader on up to 6 devices under the same account, even on computers! This allows you to access your books on all of them.

 

Resources VVV

Continue reading

2 Helpful Cloud-Based Systems

Google Docs is a web-based (cloud) application accessible to everyone. You can write, edit, and save documents all in your browser, with most features still functional without an internet connection. If this were a standalone application disconnected from the cloud, you wouldn’t get as many perks based on a connection to Google’s other cloud services, namely Google Drive which lets you save your files on the cloud. Otherwise, it’s just your standard document creation and editing tool.
Although Google could see everything I write, I don’t have concerns for my privacy and safety while using it. Google is a trusted company and I do not think that they have had any privacy-related concerns or issues before in relation to their cloud apps. According to them, our files are encrypted as well and stored in secure data centers.

BlueStacks is a computer app that emulates a phone so that you can download almost any mobile app and game and run it through the emulator on your computer. The biggest advantage to having it run using a distributed network is that your downloaded applications are stored in the cloud. They can take up a lot of space on your computer so it’s very nice to be able to download so many without having them downloaded onto your device. I have so many apps taking up space on my computer as is, I appreciate not having so many applications on my hard drive.
I used it a couple of times to access the mobile version of Instagram and it makes me wonder a little if it could see what I do and like and keep my data. I have a larger concern, though. They state that they don’t take any user data besides device-specific data like ‘hardware model, operating system version, unique device identifiers and mobile network information including phone number.’ I impulse-downloaded BlueStacks a couple of years ago to get a specific game, and I don’t like the sound of ‘unique device identifiers and mobile network information including phone number.’ I don’t see how they would get those off my laptop, and it’s most likely benign, but I don’t feel that comfortable with it. I honestly wish I had read more before installing it.

resources vvv

Continue reading

The ILOVEYOU Virus

One of the most notorious computer viruses in internet history was the ILOVEYOU worm. It initially struck in the early 2000s, causing billions in damage. It left a massive impact on society at large that still remains today. The ILOVEYOU virus tends to be the virus that pops into many people’s minds first when somebody asks them for an example of a computer virus. It utilizes some of the oldest tricks in the book, and some of the simplest, inspiring many copycats and spinoffs used today.
A victim of ILOVEYOU will receive an email from typically someone they know, an infected individual. The title of the email would be ILOVEYOU and the attachment appears as LOVE-LETTER-FOR-YOU.TXT. The .txt file extension was in fact a decoy, as the edition of Windows at the time did not display the extensions by default. It was actually a Visual Basic script file (.vbs) that when opened, orders the computer to execute many different tasks such as randomly deleting files and stealing information such as passwords. Images, documents, and other types of files were completely deleted from the computer. The virus would then open your email account and send itself to every person in your contacts list in the same fashion mentioned before. That is how the virus spread so fast and so efficiently. It went from one person’s contacts to the contacts’ contacts to all those contacts’ contacts, and so forth. It infected ten million windows computers during the initial outbreak. Considering how personal computers weren’t as common back then, those numbers are incredible.
The author of the virus, Onel de Guzman from Manila, Philippines, claims that he initially created the virus to steal internet access passwords to use the internet without paying. He sent the virus to people in Pinoy chatrooms and didn’t expect it to spread as wide as it did. He stated that he regretted producing the virus and didn’t know that it would cause massive worldwide damage. Guzman was arrested after being identified as the creator of the virus, but as there were no laws in place for cyber crimes, he was freed without charge.
The ILOVEYOU virus prompted mass media coverage of the threat and inspired many to take cyber security seriously. Nowadays, internet users are reminded not to open sketchy files, to be careful with emails, and to always make sure they know who and why someone is sending them something. Even so, email attacks are one of the most common ways to steal data and inconvenience people online. In May of 2020, the ILOVEYOU virus resurfaced and swiftly infected 5 million modern Windows computers! As cybersecurity experts in the past have said, it is imperative to STOP before you open an email or its attachment. Who sent it to you, and why did they do it? Is anything about the email sketchy? Are they asking you to do something weird? Be careful with what’s sent to you to avoid being victimized the same way.

 

Resources VV

Continue reading

Cybersecurity Scenario

I am the IT supervisor of a small-to-medium-sized corporation, a gourmet food retailer with three stores, and an online e-commerce marketplace. We sell approximately $1 million in goods each year. We have more than 35,000 customers, 100 retail employees, and 35 corporate employees. At this scale, good security is imperative as so much is at stake.
I am the IT supervisor, and I have been tasked with managing cyber threats for my organization. I have researched our systems and the threats that put us at risk specifically.

The world of cyber threats is evolving. It has been a while since we have updated our security. Here is a list of 5 potential threats to our organizations that I am particularly concerned about, updated for the Summer of 2022.

*Acquiring Viruses via E-Mail
This is a very broad category, and every office knows to be careful with emails nowadays, but it is still relevant. Email phishing is one of the easiest methods for viruses to make their way into corporate computers, and the results can be disastrous.
Unfortunately for hackers, you can’t get a virus simply by opening an email anymore. However, viruses can be acquired simply by clicking a malicious link or opening an attachment. It is a simple but reliable method to secretly install malware on a computer. It would be so easy for someone to claim they purchased from us and require help, and attach a ‘reciept’ that covertly downloads a virus when accessed.
Another weakness is when our corporate email accounts get taken over. A third party using one of our corporate email accounts could easily send viruses to other emails and customers through the methods above and even infect them as well. Automated email takeovers such as these have caused massive damage to corporations in the past and even the entire web.

*Phishing Customers
This connects to the concerns about email security listed above, however with the focus on our customers.
Since the start of the company, we’ve always used Gmail email accounts with a very simple branding layout. The issue is that we haven’t bothered to get our own email domain. Apart from our own emails appearing sketchy, it would be so easy for sketchy individuals to create a basic Gmail account and mimic our formatting to phish our customers for info. They will pretend to be an employee and request customers of ours to give them sensitive data or get them to download malware.
This will damage our reputation and credibility as well as hurt our customers.

*DNS Hijacking
Domain Name System hijacking has recently become a more prevalent method of stealing data and causing inconvenience.
DNS hijacking is a blanket term, there being many different types all having to do with weaknesses in the Domain Name System. Some are more elaborate and damaging than others. They can have to do with malware or people accessing accounts and changing our domain settings [local DNS hijacking], DNS router hijacking [DNS routers tend to have weak passwords], or man-in-the-middle DNS hijacks.
In man-in-the-middle hijacks, attackers insert themselves inside the communication channel between a user and the DNS server. There, they can eavesdrop, alter messages, and redirect individuals to spoof websites to phish them.
Our DNS should be carefully monitored and protected, as a great deal of damage can be done when a third party tampers with it for their benefit.

*Account hacking
Brute force attacks target our online store’s admin panel, guessing our password by brute force. An algorithm will try to use every single password combination possible to get in. It is simple, slow, and honestly inefficient, but eventually, once someone gets in, they can do a lot of damage. They can lock us out of our own account by changing the password and username. Then, they can do anything they want with our store, like steal data and money from customers.

*Domain Name Spoofing
Our online e-commerce market has a considerable amount of traffic. We have over 35,000 customers. This is large enough for cybercriminals to try and spoof our domain name. They will create a site with a domain name as close to ours as possible so customers may accidentally end up there. On this mock website, they could be scammed or have viruses downloaded onto their computers instantaneously. It is troublesome and puts a lot of people at risk.

Many of our policies and systems are at risk or could put our organization at risk. Some of these are unavoidable, but it is good to examine the vulnerabilities in the functions we have in place. Here are five exploitable facets of our system.

*Emails
We rely heavily on email systems to communicate amongst ourselves and our customers. These emails and email addresses are weakly branded and hard to verify, leaving both employees and clients liable to email phishing attacks. Just a click on a malicious attachment or link could let malware into our system or the devices of our customers.
Email attacks are one of the number one methods to scam and phish online. We need to have our guard up.

*Digital Payment Methods
Our online marketplace allows shoppers to purchase goods using cards or an application like PayPal. This opens up so many levels of risk, opening opportunities for everything from spoof sites to DMS attacks to directly take cash from customers thinking they’re paying us. If someone took control of our account, they could funnel the money to themselves instead of us and perhaps even charge more, stealing extra money with the payment info gained. A man-in-the-middle could redirect users to a fake payment page mimicking ours.

*Personal computers for work
Employees are permitted to use their own personal computers and laptops to do work, such as from home, or on the go; or they can even bring them to the office if they so choose. But as it’s a personal computer, they’re also doing everything else one does on a personal computer outside of work. Opening emails, downloading things, using social media, and surfing the web. If they were to get a virus they would be letting a third party not only access all of their data but ours as well.

*In-store Wifi
Our three stores have publically usable wifi. If we don’t have the proper security steps taken, a hacker could infect the network, gaining access to every device on it. They could install malware, wreck customers’ devices, and enter the devices of the employees working at our store. It could possibly lead back to the company itself.
Rightfully so, we can face legal action against us if shabby network security leads to the infection and possible destruction of many customer devices.

*Our Office System
All of our office computers are on a shared network and they are all the same model and version. Each computer has the same liabilities, so a virus that can easily infect one can easily infect the rest. The shared network also poses a risk as all computers are essentially connected. If the wifi network gets hacked and infected it will spread to each computer in a flash.

To protect our data and the data of our clients, I have a few proposals to tweak our procedures and safeguard our technology. These five suggestions will not only reduce the risk of attacks succeeding but will also help to control the damage if an attack is successful.

*Cybersecurity Plan
We have no plan for what would happen in any one of the situations I have brought up. No plan means no preparations. We need to be ready to negate damage and fix things quickly, instead of flailing around and figuring out solutions on the spot. We need to know what to do in the occurrence of an attack.
A simple step plan could work. For example; if someone’s computer gets infected, all other office computers are to be powered off, and our internet connection is disconnected to stop the spread. Until the threat is recognized and dealt with, they will remain off. After that, all computers are to be scanned for the virus, and for a period of time after the attack, our network firewall would be stricter and more cautious than usual.

*Encrypt Data
We MUST begin to encrypt ALL important data. Businesses are expected to encrypt important data, and the law states that if we do not encrypt our data and the data gets out, we are liable to be sued for our poor security policy. If someone got into our system, our data is practically fresh for the taking, if they are not encrypted. This is an essential security step. Someone could hack into our systems and get to our data, but not be able to use any of it, since they cannot decrypt it.

*Make Our Emails More Verifiable
We need our own custom email domain. It’s too easy to mimic our email naming system. Instead of having the employeenamecompanyname@gmail.com system we currently have, it should be firstnamelastname@companyname.co. This way, customers and workers can verify that this is most likely a real employee, and not just some random email on a first name last name basis.
Alongside that, we should ‘complicate’ our branding. Our emails should have a recognizable footer and structuring that isn’t easy to mimic. It would be saved in our email settings so that every email sent is formatted in that way. This will discourage phishers and make it more complicated for them.

*Get a Better Antivirus
We must have quality and up-to-date antiviruses on our computers, even if it means we subscribe and pay monthly for one. The top antiviruses have options specialized for offices like ours. They have better, more up-to-date, and more often updated knowledge of the computer viruses that exist. They can do much more than the freebies we utilize currently, such as searching links and email attachments for viruses or sketchy behavior.

*Work Computers are for WORK ONLY
Some employees use the office computers as personal devices during breaks. They browse social media and download recreational applications such as video games. If they click a bad link or a bad file and get a virus, it could put all of the other computers at risk, and ultimately our company and customer data.
As cold as it seems, we should prohibit casual use of our office computers. It is better to be safe than sorry.

Resources VV

Continue reading

Digital Resources

Analyzing digital resources that you will get help from is important, especially when you work with digital media. Everything from the publication date, voting systems, and authors matter (varying on the topic, of course!) Here are three articles I found, analyzed by recentness, author credibility, post gatekeeping mechanisms, clarity and overall quality, and if in the end, I’d return to use them.

https://smallbusiness.chron.com/rotate-selections-gimp-51543.html
I looked up how to rotate images in Gnu Image Manipulation Program (GIMP) and this article appeared first. I can’t tell how old it is as a date was not posted and there is no indicator of when it might have been posted. The author is Kevin Lee, and he has been writing technology articles since 1989, so he seems credible to write tech articles, but one can never know if he has mastered the specific program. It’s quite simple, though, so I’d trust him. I am unfamiliar with CHRON, but it seems to be a newsletter/blog written by various different authors centering around business. There is no comment or upvote system on the post. The article is clear and to the point, but very specific. The title is ‘How to Rotate Selections in Gimp’ but it’s more like ‘How to Make and Rotate a Rectangular Selection.’ There are many different selection tools in GIMP, so if one is explained as a step, it makes sense to mention the others so as to not accidentally mislead someone into not seeing the other options. It’s still a good article, short and straightforward. I’d use it, GIMP is a little tricky to get used to at first.

https://www.masterclass.com/articles/how-to-pick-a-font#what-are-serif-fonts
This is a free Masterclass article from February 25, 2022. It’s recent, but recentness doesn’t matter as the information here doesn’t get outdated as if it were specific to a program. It was made by David Carson who teaches graphic design, so it seems that he is a professional and very experienced. I don’t think Masterclass has a comments or voting system, at least for the free articles, but it’s not like just anyone can post either. the gimmick of Masterclass is that they are all masters at what they teach. This article is thorough but not wordy, it gives you little insights into the history of fonts and their terminology without being distracting or bushy. It’s organized super neatly and it’s easy to follow along with and is very interesting! I loved reading this article, I learned a lot and I’m actually going to come back again for a second read!

https://prophotosupply.com/blogs/resources/how-large-can-i-print-my-digital-image
I don’t know when this article was posted, or who wrote it, but it was posted by a site centers around printing and photos, so it seems quite credible to me. There is no comment or upvote system, but it doesn’t seem like just anyone can post either. The article is clear and thorough, it doesn’t give one-sided solutions and it has a handy chart with printing size recommendations. I’ll certainly return to use it.

DIY or CMS? Which is Best?

A content management system, or CMS for short, is a software service that helps users, well, create and manage content. It’s associated mainly with website management (WMS,) but that’s not its only use. Enterprise content management is another form of CMS service that aids in the managing of documents and records. Website content management systems, on the other hand, help users build and manage websites and the content within. Working with a CMS is very different from directly building your site by hand with HTML/CSS. They both have their own benefits and drawbacks, what is the ‘best’ depends on the person’s goals, knowledge, preferences, and budget.

Creating a website from scratch is slow. It requires a lot of study and knowledge beforehand, not only with HOW exactly to create a website but WHAT it should be like to have a good user interface and a decent-looking design. But if you don’t know the language or feel unconfident with your skill level, you can hire people to create a website for you. Creating a website with a CMS is faster than programming it yourself or even hiring a group of people. You can make a good-looking website with no experience beforehand through the usage of templates and pre-made assets. Many CMS can give you a basic website for free too, and by paying or subscribing you can access different templates and more features to implement.

For full creative control and customizability of your website, it’s better not to use a CMS. A lot of CMS tend to be pretty limited in how much you can do with them, especially when they are free or cheap, and you have to pay extra/add to your subscription to access certain features sometimes. Building it without a CMS gives you more liberty and options with what to do. However, it takes a long time to build a site yourself, not even mentioning managing it over its lifetime. With a CMS, you can build a fully-fledged functional site (depending on complexity) within an hour or two with little to no background knowledge. Coding one yourself can take days, weeks, or months, and you have to know what you’re doing. But in the end, you may create something fresh and original, and have it look exactly like you want, and with more features.

There is no doubt that a service that allows anyone to easily create their own site for free or for cheap depending on their desires would put website creators out of business, right? Now that everyone can create their own website without any prior experience at all, web designers are needed less and less. But not everyone wants to use a CMS, especially due to it’s limitations, and not everyone is willing to study an entire programming language to make a site on their own. Web designers are still in demand! According to the U.S. Bureau of Labor, the job market for Web Developers is expected to grow 15 percent by 2026.

Source   vvv

Continue reading

Striking Social Media Stats & Facts

It’s quite clear that social media has become an important part of many people’s lives, but we often don’t realize the full expanse of social media’s kingdom. What are the specifics? Here are 7 useful points about the top three social media networks.

  •  So, what were the top three social media sites, in terms of traffic, in 2019-20 years to this date?

A study by SimilarWeb in November of 2020 stated that the top three social media sites, in terms of traffic, were YouTube, Facebook, and Twitter, listed in order of popularity.
YouTube – 34.6 Billion monthly visitors
Facebook – 25.5 Billion monthly visitors
Twitter – 6.6 Billion monthly visitors

  • How does each social media site work, and why exactly do people use it?

Youtube is a video-sharing platform. Those with accounts have their own channels. Baseline, they have the ability to post videos, comment on and like other posts, and participate in polls. Reaching certain numbers of subscribers unlocks new features for the content creator, such as live streaming and the community feature. Community posts are located on a tab on a creator’s channel where the creator can post text, images, and run polls. Based on your search and watch history along with your feedback and engagement on videos and your subscriptions, Youtube’s algorithm recommends videos that you would enjoy.
People use YouTube for many reasons. To create content, of course, is one. It could be for personally storing videos, or making educational and fun videos. Watching other people’s videos is what most come to youtube for. It could be for entertainment or to learn new things and skills and stay up to date on global events.
Facebook is primarily used to keep people connected with one another. You can add friends, and Facebook automatically searches for people you may know or may want to know. You can also create pages for your businesses and advertise yourself, message other people, voice and video chat, and play games. You can add hashtags to your post to categorize it, and view posts by certain hashtags.
Typically, people use the messenger feature a lot and make simple text, images, or video posts to keep others up to date on their lives or share interesting news and information.
Twitter is used for sharing ideas, opinions, jokes… anything you can do with the ability to post text. You can also post videos and images. Twitter has a heavy emphasis on trending topics. You can access a few of the top trending topics and hashtags on Twitter easily from the sidebar on the website. Hashtags are important if you want to reach a wider audience. One can follow an account to get more of their tweets shown to them, comment on tweets, direct message people, and ‘retweet’ posts, or repost them.
People use Twitter primarily to share their thoughts and feelings, opinions on certain relevant events, and discuss topics with other people. It’s also a place for humor and memes, showing your art and other projects, and other aspects of your life such as pets. Mainly, people come to Twitter to join discourse, however.

  •  What are “demographics” and why is it important in social media?

Demographics are data in referral to particular groups within a population. A demographic is a particular sector of a population. For example, you could say that a specific type of tea is popular with an older demographic.
Demographics are very important in social media if you want to effectively communicate with people. It’s impossible to have your post appeal to everyone equally, and even if it did, it wouldn’t be as effective. People don’t want to sift through for what they’re interested in. If you care about reaching people, you need to try to reach a target demographic to keep people interested and willing to return.

  • What demographic stands out the most?

Out of the three social media I’ve listed above, Facebook’s demographic stands out to me. Facebook is certainly used by an older demographic. While the youngsters are busy bouncing around on Instagram, TikTok, and Twitter, Facebook has more of a focus on sharing world news and family and friend relations that adults may enjoy more. Other social media grab the attention of us teens and kids with more engaging, fast-paced content. However, the majority of Facebook users used to be teenagers a while back. According to data from monthly surveys issued by Facebook, the usage among teens has dropped from about 60% using it at least once a month in the spring of 2016 to a meager 27% in the fall of 2021. 27% is a shockingly low number for me, but it makes sense.

  • On average, how much time do users spend on each social media site during a day, week, or month? 

On average, people spend 58 minutes a day on Facebook. Just a couple of minutes short of an entire hour!
On average, people spend 35 minutes a day on Twitter. Not as much as Facebook, but according to Oberlo, it’s the social media people spend the second most time on in the US.
On average, people spend 44 minutes a day on Youtube. It’s a little surprising to me, as Youtube focuses on more long-form content, compared to the microblogging aspects of Facebook. I expected longer, but I suppose the scroll is compelling.

  • Which of the three social media networks is growing the fastest? Why do you think that is?

Initially, I assumed that Twitter would be growing the fastest. Either Twitter or YouTube. Twitter seemed to keep getting more and more talked about, and FaceBook was talked about only on the topic of sketchy policies, questionable polls, and business. However, my gut reaction was wrong. Out of the three, Facebook, the one I ruled out of the question, was the fastest growing social media! Twitter came in second, with Youtube last. Facebook’s growth is beginning to plateau, however, according to the providers of information I used (study by Oberlo.) I think it is due to the abundance of other social media that serve similar, but different purposes, and due to the bad reputation Facebook has been garnering over the years.

  •  How are the majority of visitors accessing these three sites (computer, mobile device, tablet)?

The majority of Facebook users access the site using mobile devices at a whopping 98.5 percent!
Mobile is number one for Youtube as well at 63%.
In 2015, Twitter revealed that 80 percent of its users at the time also access the site from their mobile devices. It’s very clear that mobile reigns supreme for these social media.

RESOURCES vvvv

Continue reading

10 Things About the Web That Everyone Should Know

The World Wide Web is a goldmine of information, but there’s a lot we can learn about the web itself too. Here are ten interesting things about the history of the web that everyone should know.

1. Today, more people access the web using mobile devices than computers.

According to a study by Perficient.com using Google Analytics’ Benchmarking Feature, 68.1% of visitors to websites around the globe used mobile devices in 2020. The number is only going up as the amount of mobile users increases. In the previous year, 63.3% of visitors to websites used mobile devices. 

2. Who controls the World Wide Web, and what is it made up of?

The web is controlled and managed by The World Wide Web Consortium (W3C). W3C is a community of over 350 member organizations. They maintain frameworks and rules related to the web and consult with companies to make sure they abide by the W3C standards for the web.

The World Wide Web is an application built on top of the internet. It is a space for information and resources to be accessed from webpages through a browser connected to the internet.

3. Who is Tim Berners Lee? What is he best known for?

Tim Berners Lee is known for creating the World Wide Web in 1989 while working at CERN laboratories to create an automated service to transfer information between scientists in universities around the globe. Later, Lee created an organization (W3C) to manage the web in its growth to what we see today, used on a daily basis by all sorts of people.

4. What is a blog? What is it used for?

A blog is a website that is regularly updated with new content usually in the form of ‘posts,’ individual pages/sections. Blogs can be for personal use, like a diary or portfolio, or for corporate use or education.

5. What is a “responsive” website design?

Responsive web design responds to the user’s behavior and environment, things like screen size, window size, and even physical orientation. A website designed responsively accommodates for different resolutions.

6. Why are “responsive” website designs necessary?

Responsive website designs are necessary for a smooth viewing experience. If the site is not responsive, it would be frustrating to use. If you shrink a window or use a different device, you may have to zoom and scroll constantly.

7. What is SEO, and why should website owners/managers be concerned with SEO?

SEO is short for Search Engine Optimization. As the name suggests, it is the process of optimizing your website to be viewed easier through search engines. A website with good SEO would be easy to find with a search engine.

Website owners and managers should care about SEO, as a lot of traffic comes from search engines.

8. What is dynamic content?

Dynamic content changes and adapts in real-time, based on signals and data from the user, like pages viewed, reading time, and more. Think of how online shops change what items are recommended for you as you browse.

9. What is a content management system? 

A content management system, or CMS for short, is a service that allows users to create and manage their own website. They are usually easy to use by those with little to no technical knowledge. An example of a CMS is WordPress, the CMS I am using to manage this blog. 

10. What is a youtube channel? Who might want to start one?

A YouTube channel is your YouTube account page. You can post videos and stream content live with it, and create playlists and comment on videos. People who make YouTube channels could be wanting to create videos for fun, advertise their business, educate people, store content privately, or just be able to support other channels.

 

Resources

Continue reading