Popular Mobile Apps

Smartphone users use many mobile apps, including Instagram, Facebook, Snapchat, WhatsApp, and more. However, the two most popular apps downloaded by millions are Instagram and TikTok. These two apps are very similar, with small differences and uses for each app and user. Both have pretty similar targeted audiences, with a near 50-50 split of men and women, ranging in age from 18 to 24.

Instagram

Instagram is an app used by many celebrities and influencers to post about their day or upcoming projects or sponsors. However, the average user of Instagram will typically use this app to keep up with these celebrities and influencers and/or to keep in contact with friends and family or even to meet new friends or partners. Instagram has features such as photo posts, video posts, stories (short clips of videos that expire in 24 hours, similar to Snapchat, another popular mobile app), lives (live streams of users for followers or any passerby to tune into), and recently Reels (similar to TikTok’s main source of media which are 5 second to 10 minute videos posted to users’ profile(s)).

Instagram is charted to have 696 million downloads in 2023 alone and was bought by Meta in 2021 which continued its growth into popularity. With this purchase came Instagram Threads and a place for users to shop for products and apparel. It is also stated that users can make from $10-$100 per post with 500 to 10,000 followers. There are many ways users make money from Instagram from simple sponsored posts to selling their own products on their profiles which anyone can do and has the capability of doing.

TikTok

TikTok is a very diverse and, in my opinion, very strange app. TikTok came from the previously famous app, Musical.ly which was removed from app stores for a few years before turning into the TikTok we know now. It did start off with users treating it like Musical.ly with the lip-synching and dancing to the very diverse platform users go to for many wants and needs. Users can find just about anything on TikTok from funny videos to lip-synching and dancing videos to finding restaurants near you.

TikTok is a platform primarily used by teenagers but has a wide age range of users and posters. It is has become a very popular platform for users to express themselves through creative content, with features such as lip-syncing, dancing, reposting, duets/stitches (ways other posters can interact with one another’s followers and gain traction), and comedy. The app has a dedicated young community, with users competing in challenges and seeking likes, followers, and featured videos. It is also a platform for anyone wanting to start businesses or music careers. Users can find many profiles promoting music or songs in process that other users have made and even products that other users have handmade for sale. However, this is where the strangeness takes action. Posters can make from 2-4 cents per 1,000 views and 20-40 dollars for 1 million views which is much different from its counterpart Instagram and famous video platform YouTube. TikTok does pay per view like these two do. Users, in order to make more money, have to sell their own products or music for examples or have a higher following enough to obtain sponsorships which provide higher income. There is also TikTok Shop which allows in-platform sponsorships and revenue. It is also a strange app in my opinion because of the amount of safety concerns. It is a platform used mainly by teenagers and young adults which can cause concern for parents and is also, similarly to any social media platform, subjected to harassment and bullying by anonymous users without any reprimand from the platform its self. Despite this though, TikTok continues its growth in the mobile app game and continues to provide users and posters with content they look for.

References:

businessofapps

AboutInstagram

spocketInstagram

Spocket/TikTok

 

The Cloud

I have found out that my Amazon uses the cloud which I did not know. It is under the AWS (Amazon Web Services) and has over a third of the cloud market holding 31% market share. Amazon Web Services (AWS) is a dominant player in the cloud market, providing a range of cloud computing products and services that enable companies to move away from physical computing technology and onto the cloud. AWS is a highly profitable and dominant player in the cloud market, providing companies with a scalable and cost-effective way to manage their computing needs. However, there are critics of AWS argue that Amazon is abusing its control of the market share by engaging in anticompetitive behavior, such as copying and integrating software from other tech companies. AWS is made up of many different cloud computing products and services. The highly profitable division of Amazon provides servers, storage, networking, remote computing, email, mobile development, and security. AWS can be broken into three main products: EC2, Amazon’s virtual machine service; Glacier, a low-cost cloud storage service; and S3, Amazon’s storage system.

However, I do not think Amazon could work as well without being a cloud because they have family accounts and Amazon owned products that keep track of search history, purchase history, and what items are left in users’ carts like Alexa. Alexa uses your account to help you and Amazon keep track of your data and interests across many accounts and devices. Even with the disadvantage of needing to operate on a cloud, it is also its advantage as it allows access to the account throughout the house with Alexas or Echo Dots as well as reminders of carts and purchase histories.

I do think it could be a bit unsafe allowing many devices to have access to your account as they could be breached by hackers or even used by guests or children in the house to use your account to purchase or change settings of your account form these very devices as well as sharing data possibilities by Amazon themselves.

Another cloud service I use that I knew of is Google. Google has their Google Photos, google Drive, and Gmail. I did not know that my Gmail used cloud as I thought it was just held in the account but Drive and Photos I knew because I am able to see my files and photos from many of my connected devices through my account. Google uses a software-as-a-service (SaaS) service to most of their applications like Gmail, Drive, and Photos.

Google uses SaaS to allows users to access any of their data by logging in to any device available which gives users any form of flexibility. It also allows users to not have to install or update their services since it is done through the cloud services themselves. It is also cost saving as users don’t need to subscribe or install other applications.

However, Saas will need two-step verifications or more for accessing any data or files on the users’ account(s). Also with enterprises the responsibility for protecting those applications and their data moves from internal IT teams to the external SaaS providers. For small to medium-sized businesses, this is less of a disadvantage, as large cloud providers typically have more resources for putting strong security in place. But this can be a challenge if a large business faces tight security or regulatory standards. In some cases businesses will be unable to assess their applications’ security themselves, for instance by performing penetration testing. Essentially, they have to take the external SaaS provider’s word that the application is secure.

I feel more secure with having to log in to access anything going into a cloud because I should eb the only one to know the password to any accounts and having multiple verification processes can help secure my account. However, I still think there are ways for passwords to be compromised and used against the user and used for any sort of reason much like with any platform and application.

 

References:

https://www.cloudflare.com/learning/cloud/what-is-saas/

https://www.investopedia.com/articles/investing/011316/what-amazon-web-services-and-why-it-so-successful.asp#:~:text=AWS%20provides%20servers%2C%20storage%2C%20networking,twice%20its%20next%20closest%20competitor.

Social Media Demographics

As of 2023, the top three social media sites were Facebook, YouTube, and Instagram.

These three are quite similar in content consumed but they are different in ways such as Facebook and Instagram are both more post and short video side of social media while YouTube has focused on more of longer videos since the beginning. However, YouTube has become more and more of a multi-format platform with long videos, shorts, and community posts. People go to YouTube for longer entertainment or Shorts for background noise, information, live shows, movies, and other forms of content for any reason; Facebook and Instagram are both platforms used by consumers for friends, family, celebrities, and even merchandise.

Demographics in its definition is relating to the structure of populations. Demographics in technology refer to the statistical data representing the characteristics of a population in digital marketing. This is a key tool used in any form of marketing to help companies and businesses reach out to the targeted audience for sales and for social platforms, an algorithm is used based on users’ content consumption. These both help platforms and companies keep users and consumers on the platform which continues to grow their user numbers.

A few demographics that stood out to me are men around the ages of 24-35 make up the biggest percentage of users, according to Statista, even though Facebook is stigmatized as an “old-people” site. For YouTube, it doesn’t come as a surprise that Gen Z and Millennials make up over half the global percentage of users. As for Instagram, it was the biggest surprise to see that over half of their global percentage of users are male and for the US, it is 55% female. I thought this was the biggest surprise because Instagram is seen as a platform women mostly go to for inspiration or to post for followers.

During my research, I have found that most users spend around 151 minutes a day. Facebook holds 31 of those minutes in the US (Exploding Topics), YouTube with about 47 (DemandSage), and Instagram with 34 of those minutes. (Backlinko)

Out of the three sites, YouTube is the site that is growing the fastest mainly due to its vast variety of content available to be consumed. YouTube has Shorts, community posts, movies, shows, cartoons/anime, and creator content in forms of Playthroughs, tutorials, education, commentary, and many more. The other platforms do not have the same variety as YouTube since almost all other content creation or platforms use shorter forms of content or specific formats.

Along with my research I have found that most users visit Facebook, YouTube, and Instagram on a smartphone (95%), desktop(90%), and consoles (80%).

 

References:

https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/#:~:text=Meta%20Platforms%20owns%20four%20of,monthly%20core%20Family%20product%20users.

https://explodingtopics.com/blog/social-media-usage

How Many People Use YouTube (2024 Statistics)

https://backlinko.com/instagram-users#:~:text=Mention%2C%20Social%20Blade-,Average%20Time%20Spent%20on%20Instagram%20per%20Day,per%20month)%20on%20the%20app.

https://www.pewresearch.org/internet/2022/08/10/teens-social-media-and-technology-2022/

Example of phishing

Phishing attacks are a type of internet piracy where thieves steal personal financial information by posing as reputable companies or government agencies, and individuals can protect themselves by being cautious with unsolicited requests and verifying the authenticity of communications. Phishing attacks have been a persistent cybercrime throughout history, with various notable examples of successful attacks on individuals and corporations, resulting in significant financial losses. Phishing attacks have been successful in various forms, including stealing passwords, installing malware, and impersonating customer service. Phishing attacks can lead to identity theft, financial loss, and damage to one’s reputation. You could receive an email that appears to come from a reputable company that you recognize and do business with, such as your financial institution but could be an internet criminal looking to steal your financial information or identity. You could also be asked to update any information you have on any sites or even governmental information such as your social and could be accidentally giving the phisher your legal information and it would not be your fault as these emails and pages or links could look like the real thing especially with the growth of AI and tools to generate realistic pages and forms. An example of phishing could be in 2007, Swedish bank Nordea lost over 7 million kronor when phishers managed to send fraudulent emails out to bank customers, luring them to install the “haxdoor” Trojan disguised as anti-spam software, which was dubbed the “biggest ever online bank heist” by digital security company McAfee. Nordea customers were hit with phishing emails containing Trojan viruses that installed a keylogger into the victims’ computers and directed them to a fake bank website where hackers intercepted login credentials. While the exact blame can’t be reliably placed, it is worth noting that most customers failed to have a running antivirus installed on their machines. Individuals can protect themselves from phishing attacks by being cautious with unsolicited requests, verifying the authenticity of communications, and never providing personal financial information over the phone or internet unless they initiated the contact. I have been able to keep myself safe as I do not answer unknown numbers, my phone is set to automatically decline unknown numbers, I also ignore texts I do not have the contact information to as I have been phished before with UPS with a text saying my shipping information was input incorrectly for a package I had ordered even though my phone and Google account have my address saved and I have the ability to auto-input my info, but I was still scammed into giving them a dollar or two for the update and “inconvenience fee”. I hope anyone who sees this can use the story and my story as an aid to be vigilant on these internet scammers and phishers.

references:

https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/phishing-attack-prevention.html

https://www.hempsteadny.gov/635/Famous-Phishing-Incidents-from-History#:~:text=The%20Nordea%20Bank%20Incident&text=Dubbed%20the%20%22biggest%20ever%20online,where%20hackers%20intercepted%20login%20credentials.

Cyber Security

Cybersecurity tools are essential for protecting organizations and individuals from various forms of cyber-attacks and data breaches, and there are numerous tools available to counter specific threats. Cybersecurity is also crucial for businesses to protect sensitive data and prevent long-term implications from cyber threats, and effective planning, implementation, and risk management can help firms assess their businesses’ cybersecurity. also as cybersecurity attacks become in sync with technology growth, they become more and more frequent and harder to see. Attackers can freely access things such as medical records, customer data, intellectual property, sensitive business data, and even infiltration of funds or bank statements. Security compliance tools scan your network, tools, and processes to evaluate them against the requirements of regulatory frameworks. It detects non compliant activities and security failures and notifies system administrators to take corrective actions. Network defense wireless tools are software utilities and techniques designed to secure and protect wireless networks from unauthorized access, attacks, and vulnerabilities. It is required for controlling access to a network, combining both hardware and software to do the job. They help identify and block threats before they can infiltrate a company’s computer network. Firewalls prevent unauthorized users from accessing the company intranet and can be implemented as hardware, software or a hybrid of the two. Encryption tools are designed to protect your data from being stolen, altered, or compromised. They work by scrambling the data into a secret code that can only be unlocked with a unique digital key. With secure encryption, the number of possible cryptographic keys is so vast that it’s nearly impossible for an unauthorized person to guess the correct one. This makes encryption a powerful way to keep your sensitive information safe. A packet sniffer is a tool used to monitor network traffic. It examines the data packets that move between computers on a network or between linked devices. While hackers often use packet sniffers to collect information about a network illegally, they are also used by ISPs, advertisers, and governments. For instance, hackers may use packet sniffing to track your online activities, such as: Streaming activities like watching videos or listening to music. Having cybersecurity is also a benefit for the companies’ productivity as viruses lead to the firm’s downtime by impacting workflows, networks, and functioning, thus bringing the organization to a standstill. Firms can enhance their productivity with improved firewalls, virus scanning, and automated backups. Employees should be trained about email phishing, suspect links, scams, and other suspicious activities to ensure productivity and reduce downtime and violations.

Reference:

https://sprinto.com/blog/best-cybersecurity-tools/

Researching

The video I found the most relevant to me was a YouTube tutorial about using colored pencils. I am currently in my fundamentals of drawing class that has my class doing colored pencils this week and I haven’t used them in an artistic way since high school. The video was posted in 2020 which is the most recent and decently in depth video I could have found. She goes into detail about layering our pencils and going back over for finer details at the end. She seems very reliable because her channel is focused a lot on art and drawing. She has also been posting art tutorials since 2013 along with the fact that she is also quite detailed in the way she spoke and instructed the viewers on her coloring. She was also speaking slow enough to keep up with and make sure the viewers are following which I found quite nice as it also helps those with hearing disadvantages or those who are neurodivergent and have trouble with retaining information. The only gatekeeping I saw in her video was the editing and speed in which she is coloring but it wasn’t in a way where she was speeding though her video and coloring but more in a way where she was describing her steps and movements through the video. I am also not able to see any dislikes due to YouTube’s new system with dislikes however, the ratio of her views versus likes is very wide as she has nearly 4 million views to her 100 thousand likes which could just be a viewer and user issue with YouTube videos as of late. Despite this though, YouTube pushes videos based on views and not likes regardless so I feel that she must be a helpful tool for artists such as myself. As for the quality of information, I feel like as she went through the video, her descriptions and instructions were very helpful, easy to follow, and wordy enough to be well in depth but not boring or have her seem like she’s rambling. I really liked her video and tutorial and feel like for the next assignment in my drawing class I would absolutely use her videos as a guidance.

Introduction

Hello geeks and peeps! I’m Jay, a 21-year-old graphic designer who loves to bake, make coffee creations, and paint. I have three brothers and co-parent four cats. I am currently in my third year at COTC and have been doing some freelancing on the side for quite some time now. I also have a baking side hustle for anyone who wants some of my baked goods! Nice to meet you!

Hello world!

Welcome to your brand new blog at Central Ohio Technical College Sites.

To get started, simply log in, edit or delete this post and check out all the other options available to you.

For assistance, visit our comprehensive support site, check out our Edublogs User Guide guide or stop by The Edublogs Forums to chat with other edubloggers.

You can also subscribe to our brilliant free publication, The Edublogger, which is jammed with helpful tips, ideas and more.