3D Printing: What’s All the Hype About

3D printing is a seemingly complicated process but, it can be simple once you break it down. 3D printing is the process of hardening plastic or resin fibers into the desired shape. In order for 3D printing to work, you need to be able to use G-code. G-code is “the programming language that plots specific coordinates on the print bed where your model will be manufactured” (Craft Cloud) Basically, it is the code that tells the printer where to print. Unfortunately, every printer is different so you may have to learn specific details or quirks about each system. There are many options for free printing software. Some options include:

  1. Tinkercad
  2. Blender
  3. Fusion 360®
  4. Cura
  5. FreeCAD

Where Did it Come From?

The first 3D printer is dated back to 1981. The inventor was Dr. Hideo Kodama. He was the first person to use resin in layers to create a design repeatedly. Years later in 2006, 3D printers became commercially available. 3D printers are used in a variety of applications, aerospace, architecture, manufacturing, automotive, healthcare, construction, and just for fun.

 

Why is 3D Printing Useful?

3D printing has revolutionized the production of the same object over and over. It leaves less room for error than a traditional manufacturing machine and it is much more cost effective. 3D printers are easy for all ages and kids as young as grade school have found ways to make money out of creations. It also allows for more complex designs as it is built layer by layer as opposed to molding a single piece of metal or plastic. 3D printing is constantly improving and changing.

3D printing does have a few disadvantages. It can be hard to find the right materials to use. They must be able to melt and harden at certain temperatures. Many of these materials aren’t recyclable so if there is a mistake it can be a challenge to reuse it. There is a limit to the size of your product. It can only be as big as the platform in the printer. Although the layer-by-layer way of printing allows for more complex designs, it can also cause weakness. When the object is small it is susceptible to breaking.

 

The Future of 3D Printing

Believe it or not, you can eat 3D printer creations. 3D printing food is now possible. It is in the fairly primitive stages right now but, it has a promising outlook. A popular example of this is the Pancake Bot. It uses a material, pancake batter, and builds the design programmed into it. 3D-printed food is mostly found in fine dining establishments where consistency is vital. It may be a swirl design on top of a dish or a decoration on a dessert but, there are advancements every day. There are rumblings about 3D-printed pizzas and plant-based meat. The future of 3D printing is bright, and tasty!

 

 

 

 

 

 

 

 

Sources

What is 3D Printing?

Software Details

Free Softwares 

History

Pros and Cons

Food

Mobile Apps Worth the Space

Mobile phones hold people’s entire worlds nowadays. There are many apps out there to help people have seamless use of their devices. With so many options, it can be hard to figure out which ones are worth your time and which ones just take up space. Here are two apps that I have found that are worth more of your time than others. Google Calendar and Spotify.

 

Google Calendar

Google Calendar is an organizational app that helps keep all appointments and events in line. I use it to keep track of classes, work, doctor appointments, and other monthly reminders. With Google Calendar you can set recurring events, share events with family and friends, and set reminders for events. You can also choose from a variety of colors to categorize events or types of events. For example, I have a class every week, and an hour before class time, I get a reminder. This is useful for someone like me who gets distracted easily, even when I know I have something coming up. There are a couple of groups that could be classified as the target audience for Google Calendar. Busy students like me may find it helpful to keep track of school, work, appointments, and due dates or deadlines. Another group would be families. With family sharing, you can link your calendar to others and share important events to keep everyone on track. Organization is important for both groups and Google Calendar can provide that.

Google Calendar itself doesn’t bring in money but, Google Groups does. They make money off of Google One subscriptions however the bulk of their income comes from advertising. They don’t have ads on the Google Calendar app so the experience is not changed for you as the user. Google Calendar is a fairly seamless program however, I do have some tips and tricks to make it even easier.

  • Make use of the color coding. Set specific colors for each type of event. For example, orange is school, green is work, red is appointments, and purple is other.
  • Set additional reminders for events. The default is 30 minutes before.
  • If you are an IOS user, add the widget to your home screen so you can see upcoming events and stay on track easier.

 

Spotify

Spotify is an app used to listen to music, podcasts, and other auditory entertainment. Spotify is free with ads however, you can also purchase subscriptions for student, single, or family plans. You can follow artists, sign up for alerts about live events, and even shop for merch. Spotify allows you to make playlists and listen to radio stations based on a certain mood, artist, or song. Spotify is a mobile app but it can also be accessed on a laptop or desktop. Spotify’s target audience is definitely younger, Gen-Z. It is marketed toward younger audiences with bright colors, flashy ads, and colorful playlist covers. You can listen to music with friends, have collaborative playlists, and see what your friends are listening to. As a student, I know that the $ 5-a-month plan is a lifesaver. I love music and it is extremely affordable.

Spotify makes its money through advertisements and through its subscription services. Spotify is also a fairly straightforward program but, there are some things that I have found that make it even easier.

  • Pin your favorite playlists. It makes them easier to access especially when trying to readily get music playing.
  • Download your music. If it’s not downloaded, streaming takes time and data that can be frustrating to wait or pay for.
  • Make use of Spotify’s AI playlist creator. It can be hard to find new music that you like so using this tool is extremely useful.

 

 

 

Sources

Google Calendar

Spotify

Cloud Services

A lot of our lives are stored in “the cloud” nowadays. Mine is no different. Cloud-based applications are also sometimes referred to as distributed systems. Cloud system is a term used to describe a system that transfers access from a database to a user through the internet. These can be public or private. Most people use them every day without even realizing and without recognizing the benefits that come from them. There are two specific services that I use that are cloud-based, Google Photos, and Adobe Creative Cloud.

 

Google Photos 

Google Photos is a service that uses the Google Cloud to store images and videos. For $29.99 a year, you can receive 200 GB of storage space. This is the plan I use. They also have options for 2, 5, and even 10 TB of storage. This service is extremely useful for someone like me who takes photos of everything. It gives me the availability to take as many photos as I want on my phone or even on my DSLR camera. Although these photos are stored in the Cloud, I am able to access them at any time on my phone. Without this cloud service, I would have to store all 145 GB of my photos on a separate hard drive as my phone does not have the capacity for that. I also wouldn’t be able to access the photos so readily.

As far as security goes, I have never had any worries about my photos being accessed by others. Google is very diligent about informing you when your account has been accessed and it is very easy to remove a device from being able to access your account. Even when I log in to another app using my Google account, I receive an email within seconds informing me my information has been accessed. I feel confident that if anyone were to try and access my photos, I would know immediately and be able to shut it down.

Google Photos is an extremely useful tool for me and the ease of it being cloud-based is unmatched. I will continue to use Google Photos to store all of my memories and I recommend you do the same!

Google Cloud Services Pricing 

Adobe Creative Cloud 

As a budding graphic designer, I am becoming well-versed in all things Adobe. Photoshop, Illustrator, and InDesign are no strangers to me. As I learn these programs and continue to work with them, I have quickly realized that I need to keep all of my work safe and easily accessible for reference or as portfolio pieces. Adobe Creative Cloud (ACC) is perfect for this. Since it is already an Adobe program, my files are automatically saved and backed up to ACC. I can access them at any time through the various programs or through the ACC application. This has been extremely useful to me in reviewing my work. Sometimes I can remember the name of a project or what it looks like but not what application I made it in. With ACC I can look up the name or visually search through all of my files to find it.

In regards to security, I have never had any issues with ACC. I can easily access my files and have never received any indication that anyone else is also trying to access them. Because I am still in school, I sign in to ACC through my school-supplied account. If anyone was able to get that login information, they could access my files but I also have everything backed up onto a USB drive so I have no issue with this possibility.

Adobe Creative Cloud has been great for my needs as a student. While it can be pricey, I believe it is worth it and if you are considering a future in graphic design you should definitely look into it.

Adobe Creative Cloud Pricing

Social Media Demographics

Social media can be an extremely useful tool if you know how to use it properly. A key to using it to your advantage is understanding demographics. According to The Oxford Dictionary, demographics are described as “statistical data relating to the population and particular groups within it.”  If you can correctly identify the target demographic or, the audience for your social media platform you can use it to advance your business even further. There are three major social media platforms that we will look into as we review their target demographic, popularity, and growth potential. Let’s dive in.

 

1. Facebook

Average Monthly Users: 2.989 billion 

What is it:

Facebook is a social networking site where a user is able to share photos, messages, and other information. You can create groups with friends, read the news, and connect with new people. Other websites use a Facebook account as a login method. Facebook is a useful tool for connecting with friends and family who live far away, ones that you might not see often, and even with companies and celebrities.

Main Demographic:

Facebook’s main demographic is male 25-34 year olds. 17.6% of their users fit into this category, followed closely by females ages 18-24 at 12.6%. They don’t have many users under 18 or over 55.

Growth:

Facebook has experienced very steady growth since 2010. In 2010 there were about 130 million users and currently, there are almost 3 billion. Its current growth rate is 7.8% per year.

Average Time Spent:

The average user spends 35 minutes a day on Facebook.

Main Access Point:

98.3% of users access Facebook through their mobile devices.

 

2. YouTube

Average Monthly Users: 2.70 billion

What is it:

YouTube is a video-sharing platform. It is used by a wide variety of people from content creators to teachers. On YouTube, you can subscribe to certain channels and stay updated on videos you may enjoy watching or learning from. Along with long-form videos, YouTube also has “Shorts” that are 60 seconds or less. You can create and upload your own videos easily, choosing to make them private or available for public access.

Main Demographic:

54.4% of YouTube users are male. The most common ages for users is 25-34 at 20.7%. Following is the 35-44 age group at 16.7%. The smallest age group is 65+ at just 9%.

Growth:

YouTube’s growth has declined from 13% in 2013 to only 4.9% in 2021. It is believed that the numbers will stay steady at this percentage. Although there is a drop in growth, YouTube is still popular and adding users yearly.

Average Time Spent:

The average user spends 41.9 minutes a day on YouTube.

Main Access Point:

70% of users access YouTube from a mobile device with the other 30% coming from computers.

 

3. WhatsApp

Average Monthly Users: 2 billion

What is it:

WhatsApp is a free messaging app. It is extremely useful for international connections as there are no fees for calls overseas. You can use it on Android or IOS on mobile devices, and computers. It is one of the only cross-platform messaging services. You can send photos, videos, or messages. WhatsApp doesn’t decrease the quality of longer videos that you might not be able to send any other way.

Main Demographic:

34.75% of WhatsApp users are aged 25-34, followed by 18-24 year-olds at 25.96%. 53.46% of users are male.

Growth:

WhatsApp has experienced fairly steady growth from 10 million users in 2010 to 2 billion in 2021. Since 2022, there has been a 10.5% increase in users. The projected growth is 18.4% for the next 2 years.

Average Time Spent:

The average user spends 28 minutes a day on WhatsApp. The average Android WhatsApp user spends 38 minutes a day on the app.

Main Access Point:

WhatsApp messaging is accessed on smartphones and mobile devices as the main use is free international calls. WhatsApp is more common on Android devices than IOS.

 

Sources:

https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/            https://edu.gcfglobal.org/en/facebook101/what-is-facebook/1/                                                                          https://www.statista.com/statistics/376128/facebook-global-user-age-distribution/                                https://www.statista.com/statistics/247614/number-of-monthly-active-facebook-users-worldwide/        https://backlinko.com/facebook-users                                                                                                                        https://www.statista.com/statistics/805671/youtube-viewer-number-growth-world/                                  https://www.mixbloom.com/resources/average-time-spent-on-social-media                                                 https://www.cooby.co/post/whatsapp-web-statistics                                                                                              https://backlinko.com/whatsapp-users#whatsapp-usage-frequency                                                                  https://www.globalmediainsight.com/blog/youtube-users-statistics/#demographics

Evaldas Rimasauskas: The Man Who Stole $120 Million

Sometimes even big corporations have cyber attacks slip through the cracks. From 2013 to 2015 Evaldas Rimasauskas, a Lithuanian citizen, sent fake invoices and phishing emails to Google and Facebook for amounts totaling over $120 million dollars. This was an elaborate operation that seemed legitimate to an unsuspecting accountant.

The first step to his phishing scam was to set up a fake business for Google and Facebook to wire the money to. He used the name of a real company, Quanta Computer, that had done business with these corporations in the past. He sent emails to Google and Facebook that had forged contracts, and invoices requesting payments. These payments were sent to fake bank accounts in Cyprus and Latvia. He was able to get $23 million from Google and $98 million from Facebook in a 2 year time period.

Although Rimasauskas was caught, Google and Facebook must question how a single man was able to steal so much from them. In the end, he was sentenced to 9 years in prison. Only $50 million of the stolen funds was recovered. This example serves as a reminder for companies big and small.  It’s always a good idea to be diligent and double-check invoices and bills. Always check where your money is going.

 

Sources:                                                                                                                             https://www.goptg.com/blog/meet-the-man-whose-phishing-scam-robbed-google-and-facebook-of-millions                                                                https://www.justice.gov/usao-sdny/pr/lithuanian-man-sentenced-5-years-prison-theft-over-120-million-fraudulent-business

How to: Manage Cyber Threats

The first step in learning how to manage cyber threats is determining what the threats actually are. There are 5 major threats to a company of our size.

  1. Phishing Attacks
  2. Ransomware
  3. Insider Threats
  4. Weak Passwords
  5. Vulnerabilities in Software

Let’s describe each of these a little bit more in depth.

Phishing Attacks

First up we’ve got phishing attacks. A phishing attack is when a cybercriminal poses as a well-known company or entity. They will attempt to gather passwords, banking details, and any other sensitive information they can gain access to. It’s very important to be constantly aware when you receive emails. There are some things you can look out for to avoid falling into a phishing scam. According to the FTC (Federal Trade Commission),  scammers may tell you that they have noticed unsuccessful log-in attempts, say your payment information is incorrect, say you have a government refund or include some sort of link for you to click on. NEVER CLICK ON THE LINKS. These may lead to fake websites and when you enter your information they will use it for whatever they want.

Ransomware

Ransomware is a form of malware or bad code that infiltrates a companies systems. Sometimes, the links in phishing emails will download this ransomware onto a company server. They will take over part of the software and “hold it for a ransom.” They will request large sums of money or cryptocurrency in exchange for the information back. During the height of the COVID-19 pandemic, ransomware became very prevalent so there is a lot more information out there than before. To learn more, read this article from Check Point Security.

Insider Threats

Sometimes, cyber threats can even come from within the company. According to the Cybersecurity & Infrastructure Security Agency (CISA), there are two main types of insider threats, intentional and unintentional. Unintentional could involve a number of things. An employee may accidentally click on a phishing email like mentioned above. They could also lose memory drives containing sensitive information and they could fall into the wrong hands. It is important to keep track of every bit of information you have. It’s also important to change your password and other login information when prompted, usually about every 90 days. Make sure to keep anti-virus software and other security  measures up to date on ANY device you access information involving the company.

Weak Passwords

Weak passwords can be a huge issue for an individual but, they can also be detrimental to larger corporations like ours. One weak password can give an experienced cyberhacker access to a whole network of information. There are 5 things that we can all do to help secure our passwords and ensure they are as strong as can be. First, avoid using common passwords such as “123456” “a1b2c3d4e5” or even our birthday. These are easy for people to guess. Avoid reusing passwords. Although it may be easy to just have one or two passwords you use for everything, one website leaking information can lead to all of your personal and business information being accessed. When offered, use 2-factor authentication. This adds an extra layer of security so even if your password is leaked, there is a second layer to get through. Like previously mentioned, regularly update passwords. When we send out reminders to update passwords, don’t ignore it. It’s important to update regularly as there is a lower chance of someone guessing passwords only active for a few months. Finally, store your passwords somewhere safe. This means don’t have them written on a post-it note or carelessly left on a desk. Make use of locked password managers or save passwords on your device. These tips will all ensure you have secure passwords and keep our company data safe.

Software Vulnerabilities

Software vulnerabilities are more technical than many of the other threats to a company. These would more be the concern of those working on the technical side of things. Employees in that position must be constantly aware of potential vulnerabilities in software. We must be aware of outdated software and unpatched systems or “backdoors” into our software. There is a necessity for constant software vulnerability checks. Many companies offer free checks to determine how strong our infrastructure is and where there is a need for reinforcement in our software. We can perform these checks regularly to ensure we are doing all we can to keep our information safe.

 

Now that we have established vulnerabilities, let’s talk about 5 specific software our company utilizes and how they could be accessed by cyber criminals.

  1. Microsoft Teams
  2. Our own website
  3. Hard drives
  4. Desktops at our stores
  5. Outlook

Microsoft Teams

This is an extremely useful tool however, it can be a security risk if we are not careful. Never share passwords or any sensitive login information through chat features. If you are ever on a public computer, make sure to fully sign out and delete any information someone could use against the company. Additionally, make sure you are using a secure internet connection when talking about company details. Use discretion with chatting with potential clients and keep secure information secure.

Our Website

As an e-commerce company, our website is vital to our survival. There are some things we can do to keep it protected. Firstly, we want to make sure that all information posted to the website has been double checked and there is nothing being released that shouldn’t be. Since we do have contact info on our website we want to make sure that all messages that come through are legitimate and verified potential customers. We also want to make sure we are checking that we always are on our company website as people sometimes pose as companies and use anything you input to weaken our security.

Hard Drives

Hard drives are physical storage units. These are utilized in our company for backups and for storing sensitive information. If you own one, make sure you always keep it in a secure place. When downloading information make sure there aren’t any viruses or malware also being downloaded. Do not mix personal and business information on hard drives. If you ever misplace a hard drive, inform someone in the IT department so we can be aware and ready for anything that may come of it.

Desktops

At each of our 3 locations, we have offices with 1-3 desktops used for company information. There are a few things we can do to ensure our data is protected. One, never leave the computer logged in overnight. Always close all tabs and log out completely. Make sure you don’t leave the computer unattended while logged in. These desktops are only for work purposes so do not log in to personal accounts or try to access personal information on them. Don’t leave the passwords visible. If you print any sensitive documents, clear the printer history and keep them in a safe place.

Outlook

Outlook is the main emailing system we use. We want to apply the same safeguards we use when on Microsoft Teams. Don’t share sensitive information, keep track of who you are contacting. It is also necessary to be aware of phishing scams and false links within emails. Log out of your email account when you are finishing work each day. Make sure your email signature only contains your company phone number as opposed to your personal contact information. Don’t give out any details about the company to prospective clients that isn’t public information.

 

There is a lot of information available about cyber attacks and protections to put in place, here are 5 things I recommend for our company.

  1. Update passwords for any company platform every 90 days. Reminders are sent but they need to be made mandatory.
  2. Do not use personal computers to access sensitive company information.
  3. Make sure there is up to date anti-virus software downloaded on every company device.
  4. Be aware of any links sent in emails.
  5. Keep hard drives in a secure place when not being used.

Following these steps will give us the best chance to be a secure company and avoid any data leaks or ransomware attacks.

Helpful or Not? A Review of 3 Tutorials

Tutorial #1: Adobe Illustrator for Beginners: Get Started in 10 Minutes

Format: Youtube Video

This video is a quick and fairly easy tutorial to follow. In 10 minutes, he describes what vectors are and walks you through Illustrator from opening the app to how to use individual tools. He even supplies some “bonus tips” that may not be readily known such as how to duplicate an item easily. This tutorial was published 10 months ago so all of the information is accurate and up to date with the version of Illustrator that I currently use. The creator of this video is a graphic designer named Andy who has over 10 years of experience. He is a member of the Adobe Community Experts Program which is a worldwide group of professionals in Adobe. He has a lot of great tutorials for a variety of skill sets, mainly focusing on Adobe Illustrator. This video in particular has over 14 thousand likes and 300+ positive comments. After watching the video, I understood everything he explained and have no doubt a beginner would be able to easily follow.  I would definitely reference back to this for the basics of Illustrator and I recommend any beginners to watch this video and use Andy as a reference.

Tutorial #2: A Beginner’s Guide: 10 Tips for Graphic Designers

Format: Blog

Although this blog was published over a year ago, the information is timeless. The authors have included 10 steps for successful designing and every point is applicable for any type of design. The authors of this blog post are known as “Team Pepper” and they write for the Pepper Blog. The Pepper Blog is a well-known blog that gives tips mainly on marketing while also touching on a variety of topics including graphic design. Their post included quite a few infographics which I believe adds to their credibility as it shows that the advice they are giving is proven from other sources as well. This blog does not have any features for commenting or liking. This post was the 3rd link when I looked up “Tips for Graphic Designers” so I believe they are a common blog for designers. It is a very easy to follow. The format was the same for all 10 points, subheading with the point, bullet points with information and most also include a graphic explaining the point or tip. I probably won’t use this as a reference in the future just because it is very basic information and I don’t necessarily have a use for it at this point in my education. I would recommend it to newcomers in graphic design.

Tutorial #3: Is Ai Killing the Graphic Design Industry?

Format: YouTube Video

This video was posted 2 months ago and it is a very relevant topic in today’s design world. The topic of Ai is a hot-button topic in many fields, especially graphic design and I don’t see that changing anytime soon. The creator of this video, Will Paterson, is a graphic designer who has owned a logo design company for over 10 years. On YouTube, Will has over 834 thousand subscribers. This video in particular has over a thousand likes and close to 200 comments that are all positive. This video moves very fast. It has more technical jargon that beginners or people who aren’t graphic designers may not understand. There is not a clear line of conversation or obvious main idea. It is more of a random FAQ session about Ai. I agree with many of the things said however, it is harder to follow. He breaks up his information with a good about of examples and graphics used to enhance his points. I probably would not use this video in the future as it is more of an opinion piece and watching it once is all one really needs from the video.

 

An Overview of Content Management Systems

What are Content Management Systems?

Content management systems (CMS) are platforms that help users produce, manage, and alter content without needing to know how to code or create a website themselves. It gives you a template to build a website without the technical abilities to build one.  While these are generally used for websites, they can also be used for other online platforms like mobile apps. A CMS is certainly a useful tool for those with growing businesses that aren’t able to code or create these platforms on their own.

CMS vs. HTML/CSS

While a CMS is a convenient way to create a website, there is another option. HTML is the language used to create websites and other online content platforms. It is a free resource for anyone to use. There are advantages to both styles. With HTML, you get to decide every aspect of the website and create more interesting pages. With CMS, you can create a website in minutes without having to worry too much about formatting or if the code is correct. HTML also provides many more options and allows for a much more customizable experience than CMS. If you have the time to learn and create using HTML then it is a great option however, using a CMS can also yield great results and effective web designs.

Impact of Content Management Systems

Content management systems do make creating websites more accessible for the everyday consumer but, are they impacting web designers? Some say yes, while others argue that they do not. CMS’s do make it easier for people to produce websites but, there is still a large need for web developers. Ryan Boddy, a senior web designer says “Software development is not going away any time soon, and I definitely think that code monkeys like myself will be able to type until our fingers fall off.” Web and software developers will still have jobs to do and CMS’s are not going to completely take over. There are instances were a CMS might just not be enough and you need that extra personal touch to create an effective website.

 

 

 

 

References:                                                                                                                                                     https://kinsta.com/knowledgebase/content-management-system/                                                           https://www.coredna.com/blogs/cms-vs-html                                                                                                 https://www.linkedin.com/pulse/code-required-cms-killing-freelance-web-developer-ryan-boddy/

Basics of Web

Today, more people than ever are using mobile telephones to access the internet. According to Exploding Topics, a website that discusses trends as they arise, 92.3% of internet users are able to access the internet by using a mobile phone. In addition to this, over 55% of website traffic originates from mobile phones. Mobile devices can be compared to a rapidly widening black hole, increasing our access to everything on the internet daily. Although many people use the internet, many do not know basic facts about the internet and its creation. Let’s dive in.

The World Wide Web

When using the internet, many people use the abbreviation www but, do they know it stands for World Wide Web? The World Wide Web consists of every public page or website that people can access through computers or mobile devices. It allows everyone to access information, communicate, and keep in contact with those around the world. The World Wide Web is not technically owned by any one country or company but, there are task forces and other groups assigned to monitoring what happens on the internet. These include IETF (The Internet Engineering Task Force), and ICANN (Internet Consortium for Assigned Names and Numbers). The World Wide Web connects everyone through information and news and is a great tool for many.

Tim Berners-Lee

Tim Berners-Lee. This name may not be familiar to you but, it should be. Sir Tim Berners Lee invented the World Wide Web in 1989. He is a computer scientist who first proposed the idea of a worldwide way to connect hyperlinks and information. In addition to creating the World Wide Web, he also created the first website. Berners-Lee made the Internet accessible to all by ensuring it was free of charge to use and didn’t require anything special. His invention has transformed our lives in innumerable ways.

Blogs

Blogs, such as this one, are online journals that offer regular updates about a certain subject or topic. There are food blogs, art blogs, dog blogs, and fashion blogs to name a few. The main purpose of a blog, or weblog, is to create a relationship between the person writing and the person reading. It is a more familiar and personal way to share information than just using a typical website.

Responsive Website Design

Responsive websites are as simple as they sound, they respond to the size of the device they are being viewed on. A responsive website would adjust to the user’s screen size, platform, and orientation of the device. These types of websites are extremely necessary because there are many types of computers out there. Not to mention the wide variety of mobile phones and tablets that a majority of people use to access the internet. The more easily accessible a website is, the more likely you are to go back to it.

SEO

SEO stands for Search Engine Optimization. This is simply the process of improving your website to be more visible in Google, Bing, and whatever other search engines individuals might use. SEO, along with responsive website design allows for a website to be more visible and accessible for all. This means more traffic and more opportunities to attract ones to your product or service.

Dynamic Content

Dynamic content goes hand in hand with the previous two points. Dynamic content is any digital information that adjusts to data, user behavior, or preference. This could be personalized ads on a website you frequent, pricing that changes according to supply and demand, or live chat features for instant customer support. There are forms of dynamic content all over the internet.

Content Management Systems

Content management systems are platforms that take care of the technical side of building a website. They allow you to create a website without any knowledge of coding or computer design. Systems such as Magento, Shopify, Wix, and WordPress are available to all. WordPress is the platform you are currently viewing this blog on. It takes care of organization, posting, and connecting others to the blog, you just have to input the information you wish to share, and bam! It’s done for you.

Youtube Channels

YouTube channels are basically video versions of blogs. They enhance content visibility and make it more appealing to those who enjoy videos such as visual or auditory learners. Ones who teach skills such as mechanics, electrical, or art may use this platform as a way to reach more people. YouTube is the second-largest search engine in the world so it is certainly a useful tool for those looking to grow their brand or share ideas more readily.

 

There are plenty of ways to share and take in information. This is just the basics so go out there and look something up, read a blog, watch a video and maybe you’ll learn something new.

An Introduction: Who is Annabelle?

Hi! My name is Annabelle and I am a second-year Digital Media Design student at Central Ohio Technical College. I love photography, logo design, and creating art that serves a purpose. Besides graphic design, I love to paint and create things with other physical mediums like pencils and clay. Art has always been my passion, and learning how to use Adobe programs such as Illustrator, Photoshop, and InDesign is giving me a chance to use my skills in a valuable and effective way.

Besides art, I love to read, skateboard, listen to music, collect vinyl records, and travel. Traveling is something I have been doing for as long as I can remember. I have been to 10 countries and hope to continue expanding that list. Combining traveling and my graphic design skills has given me a chance to be creative by doing two things I love. I am the second of three children in my family and I love to play board games and card games with my family. We are very competitive. Family is very important to me.

I can’t wait to see where this year at COTC takes me and I am excited to continue to hone my skills as a graphic designer. Thanks for reading!