Week 13 future of Tech – Julia Kaminski

The new tech I’ll be talking about is Augmented Reality (AR),and Virtual Reality (VR).  All of new technologies have to do with changing some ones reality for an amount of time, all in different ways.  Augmented Reality is usually used by a camera on a smartphone, it adds digital assets to the real world.  A popular example of AR is Pokémon Go, Pikmin Bloom, and filters used on Snapchat.  VR is where you fully emerge a person in a fictional fake world.  The person puts a headset, or something that obstructs their eyes over their face and is put into the virtual world.  The most popular VR product is the Oculus.  AR and VR was first created by Ivan Sutherland.  VR really became popular in 2016-2017 where the Oculus was just released, and Sony also released a VR headset.  AR had many jumps in it’s making in the early 2010’s.  Google announcing an open beta for google glasses, ARtoolkit being made in 2009 for Adobe Flash, and I think the most popular introduction to AR was Pokémon Go.  Pokémon Go came out in 2016 and it’s main pull was that you could see the Pokémon wherever you go when you’re cameras on.  I think this introduced the general public around the world to what AR can do.

AR helps solve many problems across many different fields.  AR can be used to reconstruct lost city’s like Pompei, it’s used during football when announcers draw lines across the screen, Neurosurgeons can use AR to project the brain and help them preform surgeries etc.  VR is used a lot to teach people. VR allows students to visit the places they talk about in class, allows students to practice surgeries in VR so there are no real consequences and they’re allowed to make mistakes etc.  I think both of these have pretty straight forward risks, they can both cause nausea, dizziness, loss of balance etc.  I think AR can also lead to a problem where people are paying attention to their phones rather then the road or where they’re walking.  I think we’re already seeing how it’s affecting reality, everyday people have access to AR and VR.  I think we’re seeing it used in everyday education and phones.  They’re being used as teaching tools and helping students learn complicated concepts.  Overall I think AR and VR are extremally helpful in everyday life and I think it could be more beneficial if VR was more accessible and less expensive.

 

Sources:
https://xd.adobe.com/ideas/principles/emerging-technology/virtual-reality-will-change-learn-teach/

https://www.fi.edu/what-is-augmented-reality

History Of Virtual Reality

https://www.interaction-design.org/literature/article/augmented-reality-the-past-the-present-and-the-future#:~:text=Augmented%20reality%20was%20first%20achieved,and%20smell%20to%20the%20viewer.

https://www.anses.fr/en/content/what-are-risks-virtual-reality-and-augmented-reality-and-what-good-practices-does-anses#:~:text=Exposure%20to%20virtual%20reality%20can,term%20%22virtual%20reality%20sickness%22.

https://www.fi.edu/difference-between-ar-vr-and-mr

Mobile apps Week 12 – Julia Kaminski

Spotify, and tiktok

The two apps that I’ll be talking about are Spotify and TikTok.  Both of these apps are very different in use, and I’ll be going in depth about each respectively in their own paragraphs.   TikTok is an app that allows anyone to upload videos on the app.  These videos can be as short as 15 seconds or as long as 10 minutes.  Spotify is an app that allows users to stream music.

TikTok was created in 2016 in China and founded by Zhang Yiming and the owner is Bytedance.  Tiktok bought the app Music.ly in 2018 this allowed the videos shared on the app to use copyrighted music.  TikTok is one of the most popular apps in the app store, being downloaded 3 billion times, it is also free to download.  TikTok was the most downloaded app in 2021.  The popularity of the app can be credited to the pandemic, “According to Statista, TikTok saw 180% growth among those ages 15-25 during this time frame”(Social Shepheard). Like I stated in the previous paragraph TikTok is an app that allows users to upload videos.  These videos can be about anything ranging from comedy, news, art, etc.  It’s common for users to download an app then forget it exists not even a week later, but it’s different with TikTok.  The app had 1 billion active users in 2021, and the app has 30.8 million active users daily(for IOS).  Most TikTok users are ages 10-19, making up 25% of users.

TikTok can also launch average users into stardom.  A popular example is Charli D’Amelio.  D’Amelio was the first TikTok user to surpass 100 million followers.  D’amelio danced and lip-synced to popular songs on the app.  Her rise in popularity caused her to have a reality TV show on Hulu and even her own drink at Dunkin Donuts.  Another example of a breakout star on the app is PinkPantheress.  PinkPantheress is a music artist who started on SoundCloud but promoted her music on TikTok.  In 2021 her song “Just for Me” exploded and was used heavily on the app.  She talks about how the algorithm on TikTok helped launch her into stardom and how it helps her gauge fans reactions on her songs.  PinkPantheress isn’t a one hit wonder either, she released an album that did well on streaming services.  Recently she was featured on a song the new Black Panther movie soundtrack.  These are just snippets of what TikTok can do for an average user and change their life overnight.  You don’t need to be a blow up start to gain money off TikTok though TikTok pays users 2-4 cents per 1,000 views.  This may not seem like a lot but if you have multiple videos that have over a million views that’s about $40 per video.

The next app is Spotify.  The mobile version of Spotify was launched in 2009, and Spotify was created by Daniel Ek.  Spotify is an app that allows users to stream their favorite artists.  Spotify is free to download but comes with an optional paid subscription.  If you have the free version of Spotify you have to listen to ads in your music, and you can only listen to your music on shuffle.  If you have the paid version of Spotify you can pick what songs you listen to, download songs to listen to offline, and have no adds.  Most of Spotify’s users are based in Europe (32%), while 22% are based in the United States.  Spotify has 422 million active users across the world in 2022.

Most of the users are men (56%) while the other 44% are women.  Spotify also is mostly made up of users who are 25-34(29 %), users who are 18-24 are only 3% behind (26%).  Spofity saw an increase in downloads after they introduced Spotfiy Wrapped in 2020.  Spotify Wrapped is something all users experience.  Wrapped tells the user their most streamed song, artist, podcast, top 10 artist etc.  September of 2022 195 million users are premium users while 273 are free users.  For how useful Spotify is it doesn’t pay it’s artists that well.  All artist who post on the platform earn about $5.5 per 1,000 streams.  This might not be a big deal if your song gets millions of streams but this is terrible for smaller artists.

 

TikTok Sources

https://fourweekmba.com/tiktok-business-model/#:~:text=TikTok%20primarily%20monetizes%20its%20business,can%20generate%20revenues%20at%20scale.

https://thesocialshepherd.com/blog/tiktok-statistics#:~:text=Ages%2010%2D19%20are%2025,49%20is%2020.3%25%20of%20users.

https://www.bbc.com/news/newsbeat-58319555

How Much Does TikTok Pay? Different Earning Sources

Spotify Sources

How Much Does Spotify Pay Per Stream? (2023)

https://fourweekmba.com/spotify-users/

https://thesocialshepherd.com/blog/spotify-statistics

Spotify

 

Week 10 post- Cloud services

Two apps that use the a cloud service are google drive and google photos.  I think with google photos it’d be a little inconvenient without the cloud but I think that’s all.  The cloud with google photos allows the user to access their photos and videos throughout any device that they’re signed into.  I think it’s a little different with google drive.  I think if Google drive didn’t have a cloud it’d be detrimental to the app.  Google photos is just picture’s but drive is a users documents, slides etc.  If google drive didn’t have a cloud you couldn’t access them though out any device.  Also without the cloud drive wouldn’t be able to scan for malware in you documents.  The advantages for both of these systems is that it’s extremally convent.  Being able to access your photos and documents with any device, weather it be phone, tablet or laptop is extremally convent.  Also everyone has google and the apps also allows you to save your documents as different types of files which is also nice.  I don’t have security concerns with drive, I know it searches for malware that may have entered one of my documents and gets rid of them automatically.  Photos is a little different.  Google photos doesn’t have anything like that so if someone were to somehow hack into the app there’s no way I could tell.  Also both of these apps allow collaboration on your documents.  With photos you can get someone who also has google photos and share a photo album with them.

Week 9 – Understanding Social Media Demographics

The top three social media sites in the world are Facebook, YouTube and WhatsApp.  Facebook has 2.74 billion users, YouTube has 2.291 billion users and WhatsApp has 2.0 billion users.  Facebook is a site where people can post pictures about their life, or anything really.  Users can follow their friends, family and companies they might like.  Businesses can also use the platform to promote themselves.  YouTube is like Google but it’s only videos.  Users can search for videos they want wheatear that be tutorials, gaming channels, relaxing music, anything a person can think of.  Users can also become content creators on the platform.  Users have the option to edit and upload videos to the platform.  If someone gets popular enough YouTube can be made into a career.  WhatsApp is basically facetime and texting.  People use this because it’s free and goes through the internet, where normal texting goes through some ones phone provider.  Demographics are age ranges, someone might try to appeal to.  It’s important that social media tries to aim for a certain demographic so they might become more popular with that age range and then eventually branch out.  An example could be TikTok.  It started out popular with teens but eventually blew up to where everyone uses it.  For the three most popular apps the age ranges vary.  Facebook is made up of mostly 25-34 year old’s.  YouTube is mostly made up of men who are 24-34, and women who are 24-34.  Most people who use WhatsApp are between 18-34.   On average people use social media a total of 2 hours a day.  Facebook is usually used for 58 minutes a day.  YouTube usually only takes up 19 minutes a day.  Users use the mobile app almost 24 hours a month.  WhatsApp can take up to 38 minutes a day.  I think the most popular/growing site out of the three is YouTube.  YouTube has the most active users, and with being a content creator on YouTube is an actual possibility so I think that will cause the site to grow.  I think YouTube is also growing because in the UK kids ages 3-16 have been using the app for up to three hours a day.  I think most people are visiting these sites from their cellphones.  You usually have access to your cellphone all day and all these cites have an app.

 

Sources:

“How Much Time Do People Spend on Social Media in 2022?” Techjury, 13 Oct. 2022, techjury.net/blog/time-spent-on-social-media.

“The 15 Biggest Social Media Sites and Apps [2022].” Dreamgrow, 17 Jan. 2022, www.dreamgrow.com/top-15-most-popular-social-networking-sites.

Statista. “U.S. Registered WhatsApp User Reach 2022, by Age Group.” Statista, 12 Oct. 2022, www.statista.com/statistics/814649/whatsapp-users-in-the-united-states-by-age.

—. “YouTube: Distribution of Global Audiences 2022, by Age and Gender.” Statista, 13 May 2022, www.statista.com/statistics/1287137/youtube-global-users-age-gender-distribution.

Statista. “U.S. Facebook Users 2022, by Age Group.” Statista, 4 Oct. 2022, www.statista.com/statistics/187549/facebook-distribution-of-users-age-group-usa.

Cybersecurity

A bad behavior online is hacking and hackers.  Hackers are people who compromise, or destroy computers, phones, tablets, networks etc.  Hackers usually do this for financial gain, for fun, gathering confidential information etc.  Hackers usually hack by putting malware into some ones device, they can do this by emailing them a link, or pretending the link is a useful tool.  Hackers can also manipulate their target so they’re more likely to click the links, and downloads malware.  They can use Trojans, Botnets Rootkits and many more.  Trojans are hacks where the hacker makes the malware look like a legitimate computer program.  Botnets are a collection of bots all working under one network, bots are robots that are programmed to do a certain script, this can involve trying to trick people into installing malware.  There’s a bot herder someone who controlled all the bots.  Finally rootkits is malware that is programmed to hide itself on your computer.  Someone who gets a rootkit on your device (they usually do this trough another hacking attack called phishing or trojans) can remotely control your device.  Rootkits can deactivate security software, spy on you, steal credit card and other important data etc.  Hackers can hack for all different kinds of reasons.  They can do it for financial gain, so stealing your credit card and other banking info.  They can use it to up their reputation in a hacking community, criminal community or just reputation with associates and friends.  Company’s can use it to spy on competition.  These are just a few reasons people hack.  When a hack is successful on a huge corporation it can lower their reputation with customers and deter future customers from signing up with them.  Hacking can also cause small businesses to completely go bankrupt because all customers stop using them, and they’re so small they don’t have a steady influx of business.  Hacking can affect an individual by using up all their money if they get their card information stollen.  It can also cause someone to have to buy all new devices because a hacker got access to their devices and they can’t get control back.  Sometimes cyber criminals are caught it depends on who they hacked.  If a bigger corporation gets hacked I think it’s more likely for the culprits to get caught.  Ways to protect against Hacker is improved cyber security.  For businesses spreading data across multiple networks can be helpful.  Backing up data on the cloud or a hard drive can also be helpful.  Users looking out for suspicious emails or phone calls can also combat against trojans, phishing and rootkits.

“Hacking | What Is Hacking? | How Do Hackers Hack?” Malwarebytes, www.malwarebytes.com/hacker. Accessed 16 Oct. 2022.

“Rootkit | What Is a Rootkit?” Malwarebytes, www.malwarebytes.com/rootkit. Accessed 16 Oct. 2022.

“Trojan Horse Virus | Trojan Horse Malware | What Is a Trojan Virus.” Malwarebytes, www.malwarebytes.com/trojan. Accessed 16 Oct. 2022.

“What Is a Botnet?” Malwarebytes, www.malwarebytes.com/botnet. Accessed 16 Oct. 2022.

Midterm – Julia Kaminski

  1. Know your enemy: As of Summer 2022, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific.
  2. Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?
  3. Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)

 

The types of digital threats I’ll be talking about are data breaches, malware, malware on mobile apps, phishing,  and Trojans.  The first is a data breach.  A data breach is where information and data is stolen without the knowledge or consent of the owner.  Things that can get stolen in a data breach are personal information, confidential information, customer information etc.  Data breaches can lead to the downfall of small companies and damaging the reputations of bigger ones.  A data breach that happened to a big company is Uber.  The head of security got arrested because he was trying to hid a data breach from the FTC.  The next threat is malware.  Malware is software that hackers make to try and steal data, and destroy computer software and computers.  Malware comes in the form of viruses, spyware, and trojans (a form of malware I’ll go into later).  Mobile malware is malware specifically made to attack someone’s mobile device, like a phone and tablet.  Mobile malware is less common then malware, but users can easily get viruses or unknow users on their phone when they connect to unprotected wifi.  Types of mobile malware are RATS, Ransomware, and advertising click fraud.  Phishing is where hackers will use an email or any other form of communication like texts to try and get a user to download malware onto their device.  If a phishing is successful they can access you’re account information, credit card information, etc.  They usually pretend to be a friend or a trustworthy looking company.  The final threat is a type of malware that I think it hardest to spot.  A trojan horse is a type of malware where it will disguise itself as helpful code/software.  If a hacker gains access through a trojan horse they could gain access to data, export files etc.  Trojan horses may also incorporate phishing and other tactics to make the user download the software.

Some processes and systems our company has in place for our data are storing data in files, multiple different storages (hard drive and backing it through the cloud),  storing customer credit information though pci equipment, securing worker data, payroll data, and protecting company email.  Our first styestem is storing data.  For our data the company would have a hard drive with all the data, then have a third party to backup all the files in the cloud.  The third party would be involved because they’re whole company goal is protecting, the data would be less likely to get hacked just because of that fact alone.  This could be exploited because the company can’t keep track of everything that goes on with the third party.  If something goes wrong all the data could be leaked.  For the hard drive if someone loses it or someone takes it all the data would be taken as well.  The next is specifically for customer credit card information.  The company would use PCI approved items like mobile devices, payment processing software etc.  We’d also stay on top of system updates and make sure to protect any audio recordings that might have credit card information stored into it.  This could also be exploited if we don’t focus on audio enough someone could overhear someones information.  Also if we don’t stay on top of updates it might be easier for hackers to get into our equipment.  For workers personal information by keeping touch with human recourses and taking stock of how we get personal information, through calls, emails, flash drives etc.  The company would only keep personal information if it’s necessary we wouldn’t keep any unnecessary information because that can cause risks we don’t need.  Physical files and drives would be locked and files saved on a cloud would be locked behind a password that only few employees have access to and it would change every six months, or when we think some else might have access to it.  This could be broken into if someone gives us an email that’s actually a phishing email/trojan.  This could cause a lot of company information to leak out and worker info.  The last one is specifically for worker payroll like all the other systems this one would be one where we have to file and keep track of our retail workers data.  This would be social security card info, and banking information.  This would mostly be physical files and things saved on the cloud.  This could be broken into if files are misplaced or miscatorgarized, or through data breaches.

 

The final step is learning how to really protect ageist digital threats.  Our protection would be advanced malware protection, falcon mobile for monitoring mobile malware, preventing trojans by not clicking unknow emails/links, spam filters for phishing and firewalls.  For malware advanced protection allows the company to monitor multiple things at once like protection, detection and response.  For example fast endpoint detection, retrospective security and contains any signs of suspicious activity as quickly as possible.  Falcon mobile allows to get more information about possible threats.  It allows us to detect jailbreak and rooted devices better.  For trojan horses and phising the company will tell employees not to click or download any suspicious emails, only hit links with HTTPS and use spam filters for their emails.  Finally the company would use firewalls to keep track of everything that comes in and out of our network.  This will also only allow things that seem safe into our network.

 

Sources

“Data Breach.” Definition, www.trendmicro.com/vinfo/us/security/definition/data-breach. Accessed 9 Oct. 2022.

What Are Cyber Threats and What to Do About Them | Prey Blog. 16 June 2021, preyproject.com/blog/what-are-cyber-threats-how-they-affect-you-what-to-do-about-them

Newman, Lily Hay. “The Uber Data Breach Conviction Shows Security Execs What Not to Do.” WIRED, 7 Oct. 2022, www.wired.com/story/uber-joe-sullivan-conviction.

“What Is Malware?” Cisco, 6 June 2022, www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html.

CrowdStrike. “What Is Mobile Malware? Types and Prevention Tips | CrowdStrike.” crowdstrike.com, 17 May 2022, www.crowdstrike.com/cybersecurity-101/malware/mobile-malware.

“What Is Phishing?” Cisco, 28 July 2022, www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html?dtid=osscdc000283.

CrowdStrike. “What Is a Trojan Horse? Trojan Malware Explained | CrowdStrike.” crowdstrike.com, 28 Sept. 2022, www.crowdstrike.com/cybersecurity-101/malware/trojans.

Just a Moment… rockcontent.com/blog/what-is-data-storage. Accessed 9 Oct. 2022.

GoCardless. “How to Store Credit Card Information Securely.” GoCardless, 19 Nov. 2021, gocardless.com/en-us/guides/posts/how-to-store-credit-card-information-securely.

“Protecting Personal Information: A Guide for Business.” Federal Trade Commission, 26 Apr. 2022, www.ftc.gov/business-guidance/resources/protecting-personal-information-guide-business.

The Risky Business of overlooking data privacy in Global Payroll. Understanding data privacy in global payroll | Safeguard Global. (2021, February 10). Retrieved October 9, 2022, from https://www.safeguardglobal.com/resources/articles/global-payroll-data

“What Is Advanced Malware Protection?” Cisco, 11 May 2022, www.cisco.com/c/en/us/products/security/advanced-malware-protection/index.html.

Freda, A. (2022, May 23). What is a firewall and why do you need one? Retrieved October 9, 2022, from https://www.avast.com/c-what-is-a-firewall#:~:text=A%20firewall%20is%20a%20digital,when%20connecting%20to%20the%20internet.

Week 6 Post

  • Technology changes very rapidly, how current is the information you found?
  • Who is posting the information? Are they an authority on the matter? How can you tell?
  • What types of gatekeeping mechanisms are in place for the source you found? (i.e., is there an editor or are posts up/downvoted democratically?)
  • Discuss the quality of the information. Is it well written, clear, and easy to follow?
  • Finally, is this a resource you might use in the future, and if so, why?

https://www.gamespot.com/reviews/splatoon-3-review/1900-6417951/

I found this review while searching for a review of the game.  This post came out last month on the 9th.  The game they’re reviewing game out recently.  The review is written by Steve Watts.  His gamespot profile says he’s been reporting, writing, and reviewing in a professional space for 14 years.  His profile also shows how many articles and other things he’s posted to show the viewer just how experienced this man is.  There’s a tab specifically for reviews, and the reviews are separated from video games and other entertainment.  The reviews are ranked from the most recent at the top to the latest at the bottom.  At the end of the article  You can also search for reviews, or have the website file it based of how good games are.  So if a game got a 10 it’d be at the top where lower numbers would be at the bottom.  the information is very easy to follow.  Watts walks the reader though each type of mode like the story mode and different types of online.  He talks about what he likes like the level design, the new game mode is enjoyable etc. and also what he dislikes like the lack of enemy variety, or lack of communication in more competitive modes.  I’d definitely use this recourse in the future.  It was very detailed and to the point, it would help me a lot in making a decision to buy any future games in the future.  The article also had a video where the author read the review while gameplay played in the background to match what he was talking about.

 

https://www.britannica.com/animal/bear

I found this post while looking for bear facts, for a project in another class.  This post was last updated on September 23,2022 but was first published May 4, 1999.  They’re giving information about bears, simple facts, their relationship to humans, natural history etc.  There are multiple people working on this page the one listed though is Howard James Stains.  When you click on his name it tells the reader he’s a professor in Zoology, tells you specially what school he teaches in and what area of study.  When you click the view all button next to his name you can see the page edit history and all the contributors.  There doesn’t seem to be any upvote or downvote system I can find only a feedback section.  The information is easy to follow, it starts by telling you the eight different species of bears there are, and then tells you some common facts, like how bears are surprisingly fast but their sense of sight and hearing aren’t developed all that well.  It talks about bears are easy to train if taken in young and have been used in circus acts.  It talks about thier bodys and conservatoin status, a lot of interesting things.  I think it can be a little hard to follow just because of how dense the information is and you’re getting a lot of it at once.  I’d use this website in the future, I’ve actually used it before on projects.  It’s not just about animals they have history facts, biography things etc.  It’s a very useful website, kind of like wikipedia if it didn’t let just anyone put information on a page.

 

I found this when my friend and I were looking at building a PC for myself at home.  I ended up getting a prebuilt one but this is the video we watched.  It was released on March 13th of this year.  It’s about how to change a processer on a mother board. In the about page of the video it says the man who runs this account has been teaching computing and future studies at the University of Nottingham for 25 years, and is also the author of 13 computer related books.  The editing has to be made in video production, to re edit a video you have to take it down and re-upload it.  There are likes and dislikes for the video and also a comment section where watchers can comment about the video.  I think the information is easy to follow, he first talks about how you first need to check the compatibility of your motherboard to the new processor you want to get.  Then he explains the difference between cores, the difference between ryzen and intel cores, and how to tell if they need a graphics card.  He then goes into detail about how to replace the core with the new one and then he shows the tests he’s running to make sure everything’s alright.  I’d watch him again, he was to the point and also included things about the motherboard and cores that I didn’t know about before.

Content management systems

Content management systems are systems that allow users to mange and create their content on a website.  It allows people to focus on how their website wants to look over stressing to see if they coded everything right.  What’s so different about CMS is that it allows people to do all of this without having to code anything, so it’s easy for people who don’t know how to code at all.  It’s not just for websites it can mange documents as well.  CMS can be things like blogs and things like that.  It allows users to easily put in text posts and images and videos without having to go into the website script.

CMS may be easiest for most users to use, but it’s beneficial if you’re going into web design as a perfection to know a little bit of HTML.  HTML is a basic coding language that’s used in most websites.  It allows developers to up website speed and HTML is supported by all browsers.  CMS is important for users who want to make a website quickly.  It’s useful for users who want a lot of website pages, or want to change their website often.  By using CMS you don’t have to re-code everything when you want to make changes to your website.  HTML is ideal for websites with only a couple of pages.  If you want to plan a huge website HTML is probably not the easiest choice, you have to build everything from scratch and it takes time away from designing, and making your site look appealing to other users.   The current practice for making a website is using CMS because like I said before you’re allowed to focus on how appealing the website looks.  CMS is good for looks and if you want to keep the coding stagnant, if you wish to make changes to the coding that’s more difficult and HTML would be preferred.

CMS has allowed companies to make a website without having to worry about coders and developers.  I think websites are trying to use CMS to try and take away jobs from developers so they won’t have to pay more people.  I think companies will soon figure out though that they’ll need developers still.  CMS is useful for small things but big companies can’t make huge changes to the coding.  Also if the code is inconsistent on a CMS you’ll need developers to fix that, and that’s only if the CMS allows it.  So overall right now yes I think it’s taking away jobs, but soon developers will be added back on after a company figures out that there are downsides to CMS programs.

Sources:

Kinsta. “What Is a Content Management System (CMS)?” Kinsta®, 16 Sept. 2022, kinsta.com/knowledgebase/content-management-system.

Dna, Core. “CMS Vs HTML: Why Use a Content Management System?” Core Dna, 5 Sept. 2022, www.coredna.com/blogs/cms-vs-html.

—. “The Web Is Broken: And the CMSs Broke It.” Core Dna, 9 Aug. 2022, www.coredna.com/blogs/the-web-is-broken.

Week 3 Research Assignment

Today the world wide web is more accessible then ever, before you could only access it if you had a desktop but today you can use your phone, tablet, laptop etc.  Mobile devices have actually surpassed desktops in totals web visits.  According to oberlo.com “53.74 percent of total we bisits are currently mobile, compared to 46.26 percept coming from desktop”.   Many people are weary of the internet, wondering if someone, or the government controls the whole thing.  That’s simply not true, the government can monitor what people search or post but they don’t own the whole thing, no one person owns the internet.  The internet is made up of different stakeholders instead of a single person or group.  The Internet was revolutionized by Tim Berners-Lee.  He was the first person to write software for a browser.  He was also willing to share the code for the World Wide Web and make it open sourced for everyone, and it remains that way today.  A popular aspect of the internet early on that stays with it today are blogs. Blogs are different from regular websites because older posts stay at the bottom of the website, while new posts are boosted to the top, also blogs are usually made up of one person or a small group of people.  Blogs are used for  posting about peoples personal lives, random thoughts,  how they feel about certain political issues etc.  Today blogs have evolved from that some big companies use blogs but they’re usually more professional and post useful information.  Youtube channels can also act as a blog.  A YouTube channel is something a person makes where they can post whatever content they want as long as it fits the community guide lines.  People often post tech tutorials, gaming videos or reviews.  Often people start YouTube channels when they want to share something with a wide audience of people, or possibly start a career off of it. When the internet was first created you could only access it on desktop computers, developers didn’t have to worry about making a website work for smaller screens or devices like a phone.  When mobile devices were finally able to run the internet developers had a new problem of designing websites for other devices besides computers.  This challenge created a new term responsive web design, this term is used when a website is designed for different devices, and can change their layout based on what devices the websites being accessed on.  Responsive web design is important because most people use the web from mobile devices.  If a website can’t work on a mobile device what’s the point of having access to the web on your phone.  Responsive web design is also important for people with disabilities, allowing them to have an easier time on the web (even though this technically falls under accessibility).  One thing developers also have to be concerned about is SEO, it can be a good thing or a bad thing.  SEO basically determines how likely people are to see your website when they search on things like Google.  SEO is determined by bots, they determine what websites should appear on each page depending on the search, basically which website will be most helpful for your search.  This can negatively affect websites for obvious reasons if you’re put at the bottom of a page you’re likely to get almost no interaction on your website.  Dynamic content is something a lot of developers use for their website.  Dynamic content is content on a website that changes based on the user.  The content a person experiences is based on their personal data and history on the internet.  An example of this can be chaining a phone number on the page based on a persons location.  A popular thing for people to use on the internet are content manger systems.  These systems allow someone to change a website without having any knowledge on coding.  An example of this is the website we’re using for these discussion/blog posts.  The name of this website is Cotc.edu, it’s used by students to post assignments like this.

 

Citations/sources

Gaubys, Justas. “What Percentage of Internet Traffic Is Mobile? [Sep ’22 UPD].” Oberlo, Oberlo, https://www.oberlo.com/statistics/mobile-internet-traffic#:~:text=Mobile%20Browsing%20Stats%20in%20the%20United%20States&text=As%20of%20May%202022%2C%2052.79,to%2047.21%25%20coming%20from%20desktops.

Internet Society. “A Brief History of the Internet.” Internet Society, 4 July 2022, www.internetsociety.org/internet/history-internet/brief-history-internet/?gclid=CjwKCAjwx9_4BRAHEiwApAt0zjUzfxdkZrgiBJtBH3FaGZVejfUzzvz5QpF8BWrqjUTPH-fNIsNz9xoCKQkQAvD_BwE.

“Tim Berners-Lee | Biography, Education, Internet, Contributions, and Facts.” Encyclopedia Britannica, 26 Aug. 2022, www.britannica.com/biography/Tim-Berners-Lee.

Castells, Manuel. “The Impact of the Internet on Society: A Global Perspective.” OpenMind, www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-global-perspective. Accessed 7 Sept. 2022.

Balkhi, Syed. “What Is a Blog and How Is It Different From a Website? (Explained).” WPBeginner, 11 May 2022, www.wpbeginner.com/beginners-guide/what-is-a-blog-and-how-is-it-different-from-a-website-explained.

Responsive Design – Learn Web Development | MDN. 7 June 2022, developer.mozilla.org/en-US/docs/Learn/CSS/CSS_layout/Responsive_Design#see_also.

Search Engine Land. “What Is SEO / Search Engine Optimization?” Search Engine Land, 18 Apr. 2022, searchengineland.com/guide/what-is-seo.

Omniconvert. “What Is Dynamic Content? Definition and Examples.” Omniconvert, 7 Mar. 2022, www.omniconvert.com/what-is/dynamic-content.

Hello world!

Welcome to your brand new blog at Central Ohio Technical College Sites.

To get started, simply log in, edit or delete this post and check out all the other options available to you.

For assistance, visit our comprehensive support site, check out our Edublogs User Guide guide or stop by The Edublogs Forums to chat with other edubloggers.

You can also subscribe to our brilliant free publication, The Edublogger, which is jammed with helpful tips, ideas and more.