Uncategorized

WK13 Future Tech

Explain the tech; what is it, how does it work, what hardware, software, and network does it need?

Virtual Reality (VR) is a face-covering device that can do what was once only imaginable in comics and fiction; suddenly, becoming a part of your favorite video game in person became very possible. The VR device tracks your body’s movements and position, allowing for a realistic simulation of the world around you on a thin screen that covers the entirety of your peripheral and frontal vision. The VR is run similar to your cellular device or laptop, typically connected to a 5G adoption scale and edge computing for LTE – but it can change depending on the nature of your device, whether you own the Quest or Occulus, and/or the rendering availability. (STL Advisory, 2022)

Is it currently available to the public?

The VR is VERY available to the public, although to own one yourself you are looking at a spending fee varying between 400.00 – 700.00. Malls, attractions, and occasionally game shops will have VR stations available for users to use, whether it is a rented VR that the user can borrow for a few hours or bringing their own to use in-shop! The VR community is wide and diverse, allowing for users to play games from a new perspective online as well to communicate together!

Who (or what) invented or pioneered the technology?

Virtual Reality has been a targeted subject for years, being worked on in tech research as a major goal and achievement. The very first head-gear based device that was created to work as a VR was made by Ivan Sutherland with the assistance of students. His VR was titled “The Sword of Damocles” – which may have been very bulky for equipment and of a simplistic function, but it operated and met the goal in 1968. Ivan Sutherland inquired, “The screen is a window through which one sees a virtual world. The challenge is to make that world look real, act real, sound real, feel real.

What "problem" does it solve for its users?

While the VR may not specifically resolve any known problem, it can provide uses in ways that can be beneficial. For nursing students, there are VR programs that can allow users to recreate a dissection analysis for the human anatomy, along with other games that can be considered interactive learning. The VR can provide upwards of 6 hours’ worth of entertainment with a battery extender, acting as a great time killer and distraction for any time of day.

Are there any potential drawbacks or dangers of using the tech?

While the VR offers a new, technologically advanced system to its users, the device still suffers from drawbacks, error, and risks all the same. As the VR is a used with a face-covering system, a major risk to the VR is tripping, walking into walls and items, and general lack of physical world awareness.

Offer one example of how widespread adoption of this technology might impact society.

Technology and its many forms have impacted society in more ways than most recognize, and that applies to VR too. While VR is newer to the world in contrast with computers and phones, it is still sharing an influence on the user’s who can utilize it. The widespread adoption of the VR can increase people’s ability to socialize, introduce opportunity for disabled people, increase learning availability, and so much more.

https://stlpartners.com/articles/edge-computing/how-5g-and-edge-computing-will-transform-ar-vr-use-cases/

https://www.vrs.org.uk/virtual-reality/history.html#:~:text=In%201968%20Ivan%20Sutherland%20and,ceiling%20(hence%20its%20name).

WK 9 Social Media Demographics

 

What were the top three social media sites, in terms of traffic, in 21-22? List them in order of popularity. 

New platforms for social media are being created, updated, and monopolized every day. With the consistent change in the industry, it leaves room for a lot of competition for viewers! Who can pick up the most popularity? How fast? With Tiktok’s ever-growing platform, one would think that it falls under one of the fastest growing, most beloved platforms of 2022 with over a billion users and fans; however, for 2021 and 2022 users, it is no debate that Facebook takes the crown at #1 most used social media app for years running from 2009 to current. Following Facebook for the latest years, Instagram and Twitter follow suit at #2 and #3 for having the highest traffic, member count, and sponsorships! 

Provide a brief summary of how each social media site works and why people use it. 

Social media: the apps and webpages that nobody can get enough of. Whether it’s sharing life activities or puppy photos and political discussions, communication has never been more vivid and active as it is today! Social medias thrive off of their monetization and users, acting to spread content for anyone no matter how old, broke, educated, or fashionable. People flock to these medias to stay in the loop about the latest trends and politics, keeping in touch with the real world through the virtual one as some may put it! 

What are "demographics" and why is it important in social media?

For colorful cartoons, it is common for the target audience to be for young children who enjoy the bubbly characteristics. For a babysitting advertisement, the target audience might be for parents who need a minute to themselves. A “demographic” is the target audience – what audience do you want to attract? For social media, the demographic is important to take notice to as it is who will most likely be interested in the platform. Twitter and Instagram tailor to those with the interest of sharing their life and communicating; young adults are more likely to be the target demographic.

Explain any demographics that stand out among the three social media sites you listed above. (More popular with a specific age group, are majority of users male or female, married or single, employees or self-employed, etc.)

For Facebook, it is noted in 2022 by Salman Aslam in his statistic review that the widest demographic for Facebook users is faced in the gender identity pages from the ages of 25 and 35 years, at 18.8% for the average male users and around 12.8% for the female user. 

For Instagram, Stacey McLachlan’s careful analysis estimates that the vast majority of users demographics rank from the ages of 16 to 30, notably varying from most ages up to 60 as well.

For Twitter, Alyssa Hirose reports that the typical variation for users are between the ages of 20 to 35. Twitter occasionally contains inappropriate themes for younger demographics and is targeted for adults with less monitored content.

On average, how much time do users spend on each social media site during a day, week or month? Provide a resource that supports your answer.

Social media is indisputably an addictive activity that a vast majority of internet-accessed people share, containing a whopping 4.74 billion people of the populace world-wide! It’s no doubt that the most frequently used medias would hold a large quantity of monthly viewers, that being proven in MANSOOR IQBAL‘s statistics on 3 different blog posts he shared specifically for Facebook, Instagram, and Twitter. 

Facebook holds a monthly visitor count of over 2.9 billion guests.

Instagram holds a monthly visitor count of over 2 billion guests.

While lastly, Twitter holds the least amount of monthly guests with only 450 million guests per month. 

MANSOOR IQBAL supports these statistics thoroughly in his blog posts, “Facebook Revenue and Usage Statistics (2022)” , “Instagram Revenue and Usage Statistics (2022)”, and again in “Twitter Revenue and Usage Statistics (2022)”, explaining not only the statistical value of the demographics and usages, but including profit margins and review.

Which of the three social media networks is growing the fastest? Why do you think that is? 

Between Facebook, Twitter, and Instagram, Instagram is easily experiencing the most dramatic incline of growth annually. Again in MANSOOR IQBAL’s statistics, it can be compared that Facebook and Twitter’s following have not improved as drastically in recent years where-as Instagram has reached a seemingly constant status of user-growth for 2022. 

How are the majority of visitors accessing these three sites (computer, mobile device, tablet)?

For the vast majority, cell-phones, tablets, and easy-access mobile devices act as man’s new best friend for a constant companionship with whomever they belong to. Easy transportation makes for easy usage, leaving social media users with consistent access to their apps practically anywhere they choose to go! While computers are still utilized popularly, it is understandable that visitors would opt to spend a moment of their day flipping through media on their cell-phone’s app rather than taking the time to search for it on the computer.

https://wallaroomedia.com/blog/social-media/tiktok-statistics/

https://mirasee.com/blog/social-media-platforms-2/

https://blog.hootsuite.com/social-media-demographics/#:~:text=Understanding%20social%20media%20demographics%20will,right%20people%20with%20your%20message.&text=When%20building%20a%20marketing%20strategy,your%20potential%20audience%20is%20essential..

https://www.businessofapps.com/data/instagram-statistics/

https://www.businessofapps.com/data/twitter-statistics/#:~:text=Twitter%20reports%20daily%20monetizable%20active,450%20million%20monthly%20active%20users.

https://www.businessofapps.com/data/facebook-statistics/#:~:text=Facebook%20Daily%20Active%20Users,or%20Facebook%20Messenger%2C%20or%20website.

https://www.omnicoreagency.com/facebook-statistics/

https://blog.hootsuite.com/instagram-demographics/#:~:text=As%20of%202022%2C%20the%20majority,even%20ranking%20it%20above%20TikTok.

WK8 Cybersecurity

find one concrete example of "bad behavior" in the online space. briefly summarize what happened... Who was involved, and what was the outcome? Was there financial loss or damage to someone's reputation? Were the criminals held accountable? What practical lessons can we learn as a result of this example (i.e., what will you do to avoid being similarly victimized?)

 

Bad behavior is a painfully common response in the digital world; from hackers who take people’s private information and steal, to “doxxers” who spend their time religiously stalking people and reveal information publicly about them. People who act motivationally on bad behavior are often targeting subjects as a joke, but there are those who behave with the intent of damaging other’s reputation or causing harm to the individuals.

This malicious activity online is no foreign concept, as news outlets, Twitter fans, Twitch streamers, famous idles, and more have been victim to false pretenses and nonconsensual information reveals.

A dangerous tactic known as “swatting” is unfortunately one of many bad behaviors from internet trolls. Thriving to ruin people’s lives and wreak havoc, people who “SWAT” are best-known for finding live locations to report fake, extreme illegal activity like hostage situations, drug busts, and terrorism. Adrian Diaz, the local chief of Seattle PD, warns on the station’s blog, “Anyone can be the target of swatting, but victims are typically associated with the tech industry, video game industry, and/or the online broadcasting community. We have also seen cases where criminals are attempting to silence people with elevated online profiles, elevating these particular swatting incidents to hate crimes.”  The people who are swatted will be raided by police and, of course, held at gun point and arrested.

One victim of a particularly bad case of swatting was Joshua Peters, known online as the streamer KoppaTroopa who live streams videos of games on Twitch. During one of KoppaTroopa’s live streams that are reported to have over 60,000 viewers present in 2015, he and his family was swatted by the police with an anonymous call. With no warning in the confusion, it was KoppaTroopa’s 10-year-old brother who opened the door for the officers –

only to be immediately greeted by approximately 10 officer’s guns faced at him. (Matthew Wilson, 2015)

 

In a reposted clip of the streamer’s reaction after everything was cleared up on Youtube, KoppaTroopa states shakily, “I had police point a gun at my little brothers because of you. They could have been shot, they could have died because you chose to SWAT my stream.” Fans, family, and everyone involved were enraged by the heinous act, but it is unknown whether the aggressor was arrested or caught. KoppaTroopa and his family was physically left unharmed, but it is almost certain that the trauma and emotional damage will stick with them for years to come.

Online safety is vital, especially for those who are consistently posting on the internet and performing live streams. The best way to stay safe and prevent similar incidents is to ensure that you practice cautious information sharing and refrain from giving out your personal information online, no matter how brief or minor.

 

https://www.looper.com/746388/streamers-who-were-swatted-live-on-stream/

https://www.seattle.gov/police/need-help/swatting

https://www.kitguru.net/channel/generaltech/matthew-wilson/twitch-streamer-swatted-in-front-of-60000-viewers/

https://www.polygon.com/2015/2/9/8004183/swatting-victim-to-harassers-ten-cops-pointed-guns-at-my-little

WK7 MIDTERM

Know your enemy: As of Summer 2022, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific. 

For years of late, security breach from hostiles have threatened countless web pages extensively. Keeping in mind the nature of these threats, it’s important to recognize who and what is a danger to your particular website and how you can prevent them from trespassing.

Among these cyber threats, the most probable are as follows;

email and spam

Email and spam attacks aren’t unusual to the average citizen, sent out by attackers in bulk to randomized people in an attempt to phish them into giving out information, downloading a virus, or giving them money. The attackers disguise themselves by falsely advertising for free anti-virus malware, services like doctor’s offices or your bank, links, and demands for compensation on a fake payment through your email. Once you receive the email and reciprocate it, they use your response to hack into your computer and steal the information they deem necessary.

Unauthorized use of your organization’s system privileges

While unauthorized use of system privilege is far less common compared to the popular spam attack, in stark contrast it is more personal and can be employed by someone with direct access to the system. For example, a worker with administrative access could steal financial information from the company they work for effortlessly, or an opposing company could get access to the system privileges and destroy data to rig the website. 

 Loss and theft of devices

Loss of devices is different from theft when comparing severity; for theft, devices can be deliberately taken with a motivation involved. If the device is stolen intentionally, the information stored on it can be taken out or replaced with ease by the attacker.  A loss of the devices would include carelessness or error on the employees and administrator’s part, which would pose a slightly less risk when compared to being stolen.

Ransomware

Ransomware is a technologically advanced form of attack made against devices data directly. The ransomware typically locks up important files and encryptions, demanding a ransom payment before allowing access to the information once more.

Account Takeover

Account takeover is the process of an attacker gaining internal access by stealing an account through fake passwords, emails, and external devices usually gained through phishing and stolen data.

Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?

Digital systems are especially at risk of negative intervention, but understanding how a website functions and performs is the first step to prevention and identifying errors made.

The top digital processes performed at this company website is as follows;

Applications

Applications are the software used for easily over-seeing work done across the site and information collected. They allow administration to monitor activity across every nook and cranny of the website and what goes into it, but if it were to be tracked by unwarranted attackers every business opportunity, website interaction, or communication could be documented and traced.

Infrastructure

Infrastructure involves the process of good production and supply stock. For this company’s production of food, an attack may destroy daily stock analysis, supplier communications, ratings and exportation of services.

Enterprise applications

Enterprise applications are implicated on the website to improve communication and timeliness with employees, clientele, suppliers, business partners, and to coordinate data. If the enterprise applications were to be threatened or hacked into, access to sensitive materials and service logs could be found and exploited.

Engineering

The website’s engineering is the process that ensures the screen speed, load quality, and internal data is optimized and easy to maneuver, look at, and run.  By exploiting the engineering of the website, attackers can destroy the general functionality of it to prevent site usage or rewire it.

Security

 Security is the site’s critical ability to remain protected from viruses and data theft, utilizing safety malware that defends the firewall to prevent an attack. With security, it can be infiltrated by bugs and hackers removing the protective measures or false offers for a new malware assistant that will create more damage.

Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)

While threats can poke their heads around the corner at any time for businesses, there are listless ways to defend and prevent lasting, or even subtle, damage that they can do.

My top recommendations are as follows;

A secure web host

A secure web host can go a long way, ensuring that all data listed on the site is protected including sensitive information like SSIDs, credit cards, and addresses. The user’s protection is put first with a secure web host, “GoDaddy” being a strong example with its ability to find a safe host affordably.

Recording user activity and privileges

A good software that monitor’s user activity thoroughly can help prevent undesired access to information, “Mouseflow” is an example of an accessible system that comes with a variety of options for analytics, tracking, and even problem identification.

Extension for email filtering

Email infiltration is a highly common problem among people, but an extension for filtering out spam emails can prevent minor mishaps. “Barracuda” acts as a security software that mainly monitors email activity and internet safety, reporting even the slightest change in your website’s firewalls.

Software for monitoring data efficiently

Monitoring is vital for any aspect of business; from website access and internet security to stock data and sale statistics. “Datto” specializes in monitoring the data aspects, listing communications and sales clearly and thoroughly at an affordable price.

Inventory analysis assistance

Inventory analysis is equally as important as sale statistics, and utilizing a system like “TowneBank” can help to monitor supply costs, counts, and availability.

 

https://www.mass.gov/service-details/know-the-types-of-cyber-

threatshttps://www.exabeam.com/information-security/cyber-security-

threat/https://www.cognizant.com/us/en/glossary/digital-systems-and-

technologyhttps://www.gartner.com/en/information-technology/glossary/enterprise-applications

WK6 Where Can You Turn For Help?

Technology changes very rapidly, how current is the information you found?
Who is posting the information? Are they an authority on the matter? How can you tell?
What types of gatekeeping mechanisms are in place for the source you found? (i.e., is there an editor or are posts up/downvoted democratically?)
Discuss the quality of the information. Is it well written, clear, and easy to follow? 
Finally, is this a resource you might use in the future, and if so, why?
Good Old Fashioned Pancakes

https://www.allrecipes.com/recipe/21014/good-old-fashioned-pancakes/

  • The date this post was made is not known, but the last 3 reviews are dated freshly to 10/02/2022, 10/01/2022, and 9/29/2022!

Dakota Kelly is the author of this tutorial. While most information on Kelly is private or irrelevant to the viability of her pancake recipe, I can assume that the pancake recipe may be easy to work with based on ingredients and the reviews.

While there may not be gatekeeping mechanisms used on All-Recipe’s website, a  missed ingredient leading to overly saturated batter, cooking too long, or adding too much of one ingredient and ruining the pancakes have led to the occasional negative feedback.

The information is well written and easy-to-read, allowing the user to follow the recipe effortlessly. The ingredients are listed and measured for making the batter, going as far as to add a tutorial video and example images. I would, and have, used this recipe multiple times before and the pancakes usually have a great taste as long as they are cooked correctly. The site that the recipe was posted on has numerous other successful recipes, including various other meals, deserts, and breakfast foods.

How to Identify 10 Red and Pink Minerals.

https://www.thoughtco.com/red-and-pink-minerals-1440941#:~:text=Rose%20Quartz,-Petri%20Oeschger%2FGetty&text=The%20color%20ranges%20from%20the,Luster%20glassy%3B%20hardness%207.

  • June 22, 2019 was the last update made to the article. The information is relatively recent, and the information remains applicable to identifying the listed minerals and crystals.

Andrew Alden edited and wrote the information available. According to the website, Alden is a professional in Earth Sciences at the University of New Hampshire – he performs with a bachelor’s degree in geology and is working as an editor and author for ThoughtCo!

While Alden is an editor working for the site, the information being shared is not biased due to it being observation and directional rather than sharing information like local news channels.

The information that is shared is short and sweet, getting to the point and briefly explaining the differences among the minerals and how they can be individually be identified just as the title implies; however, I would not utilize this source in the future as I would prefer a more in-depth explanation between crystal identification that specifies in the mineral I am identifying. ThoughtCo offers various articles for scientific experiments, discoveries, and furthered research for the user’s convenience. It has a lot to offer for people with a curious mind.

Russia-Ukraine War: Ukrainian Forces Patrol Strategic City After Russia’s Hasty Retreat

https://www.nytimes.com/live/2022/10/02/world/russia-ukraine-war-news

  • Oct 2, 2022 is the latest update, as the source is LIVE on NYtimes’ website and offering constantly updated information with photographical evidence.

Melissa Eddy continues to update the article on the daily. Eddy is described on her own page by the New York Times,

“Melissa Eddy is a correspondent based in Berlin who covers German politics, social issues and culture for The New York Times. Her most recent work has delved into the challenges of integrating one million refugees, the spate of Islamist terror attacks and the legacy of a trove of Nazi-looted art.”

She is a professional in the correspondent industry, and was tasked with monitoring and sharing first-hand the description of the events she witnessed.

There is a chance that the author does gatekeep aspects of information from the written description of the events, but furthermore the information is shared clearly from a first-hand perspective at a renowned, trusted source. Photo evidence is left on the page for viewers to get a visual, and the author is linked to her own page where it lists her credentials.

The information that is shared is extremely thorough and descriptive, sharing in detail the events that were witnessed and experienced through the informational investigation. The New York Times has long since been a valued news outlet for the public, consistently sharing events since 1851 reliably and in good time. To this day their information shared remains useful and trusted, I would absolutely come back to this site for further reference.

WK5 Research Assignment

Briefly define what we mean by “content management system.” Is it just for websites?

Content management systems (CMS) are programs and software that were developed to organize, manage, edit, and design content pages for businesses and media to publish. While CMS is typically utilized for websites, they are also helpful with documents, files, components, and digital assets. Editorial staff at WPbeginner suggests that beloved WordPress, HubSpot, and Joomla take the cake at TOP 3 CMS sites for beginners looking for cheap, easy options!

Compare and contrast building a website using a CMS and coding a website by hand using HTML/CSS. What are the benefits and drawbacks of each? What is the current best practice when it comes to making a website?

CMS and HTML are both useful, well used applications that have produced and managed content across the world. What is the difference? Is one better than the other? HTML is the building blocks of webpages. You can use HTML to build a website from scratch entirely on your own and control every little detail, whereas CMS has a more controlled interface that consequently limits the user. Making editing faster and more maneuverable, CMS provides a shortened version of HTML- which requires ability with coding and may be for more experienced users. For making a website, the best practice is whichever would feel most comfortable for you.

Personally, my preference is in HTML!

How do CMSs impact the web design industry? Are they taking away jobs from web developers?

CMS impacts the web design industry by allowing for faster results that anyone can utilize for little to no cost, though that does not necessarily imply that it takes away from paid web developers. Developers that receive money for creating individualized programs are well-paid and for good reason, as even though the work can be costly it is far more precise to desired results for complex programs.

 

 

https://www.wpbeginner.com/showcase/best-cms-platforms-compared/

WK3 Research Assignment

         In early years of computer research, the internet was AGONIZINGLY slow and scarcely provided easy-access webpages. If you were of the lucky few who owned a computer as they were first released, crossing your fingers was essentially the best option when waiting for a page to buffer!

With the modernization of electrical equipment, new versions of smooth-running computers and cellphones popularized to become the average person’s side-kick. Since then, mobile devices have taken the world by storm through their continuous development, convenient options, and proficient apps available to the users. While the computer has been a heavily utilized system that is well-loved, mobile users have started to bypass computer users by a landslide! According to Christo Petrov’s statistical based research at techjury.net, there is over 63.1% of the world’s populace that accesses the internet; a whopping 92.1% of them use their phone instead of a computer to do so!

With the improvement in modern internet, the web is accessible to everyone and anyone all across the world and on multiple platforms – but who is the “top-dog” in control of the world-wide web? The government? There are no soul owners of the internet realistically, it is uniquely designed to be controlled by the users and what it is they post and profit from. There are corporate businesses that may dominate their own networks and what information is released, but there is no ownership of the world wide web aside from Tim Berner Lee’s accredited, renowned work, in the invention of the web in 1989.

 

http://giphy.com/stickers/10Clouds-computer-10clouds-10c-IauL6LvGNlT3ffhcqq

 

         Blogging is a personalized webpage that allows the author to answer questions, share stories, or post written productions to the public. In around 1994, it is assumed that the first blog and step into the media was posted by a student named Justin Hall to publish his work (Dianna Gunn, 2021). Blogging blasted off, and a simple post could attract thousands of potential readers searching for advice, general comfort, or content to relate to. Competition was introduced with the new media, and grabbing onto the viewer’s attention became a constant effort in the design industry.

Heads turned to focus on “dynamic content”. Dynamic content is the relevant, latest information posted on a webpage that captures the audience’s attention and keeps them attracted. If the user is engaged, they’ll remain focused on the page’s content.

 A content management system (CMS) is an application that allows users to create and edit digital posts globally. CMS’, like our very own Word-press for example, are available for everyone to use and are most commonly associated with businesses looking to promote information or produce topics that may be useful as articles. Utilizing CMS’ is vital to media workers and those who post, as it can help attract attention to their materials.

         Newer websites called for shortened design and easy visual aid, often in blogs or manufacturing web pages. A responsive website design uses coding that leaves the app and webpage maneuverable and aesthetically pleasing to users across multiple platforms, which came in handy for new designs. Be it computers, cellphones, tablets or TVs, a responsive website design is visually approved for each screen. Responsive website design across all platforms is necessary for app and website productions because users may not be able to maneuver content properly without confusion or frustration. The owner’s inconvenient error may face criticisms, and it can cost them page views and monetization.

With decreased page views, SEO, or “search engine optimization”, is the affected gradual process of increasing a website’s visibility on search engines when relative searches are made. “The better visibility your pages have in search results, the more likely you are to garner attention and attract prospective and existing customers to your business”, as explained by Third Door Media, 2022.

 

 

Youtube is an example of a popular, well established website that caters to business opportunists through responsive web design, CMS utilization, and dynamic content all in one!

A Youtube channel is a service that allows a user to establish an account for marketing, posting videos, sharing content, commenting, and subscribing to another person’s content across the Youtube platform. Anyone can make a youtube account for various reasons, but personally I use it to listen to music, subscribe to accounts I enjoy, and watch content I think is humorous! 

 

https://www.webwise.ie/parents/what-is-youtube/#:~:text=YouTube%20is%20a%20video%20sharing,tablets%20and%20via%20mobile%20phones

https://www.businessnewsdaily.com/9854-youtube-for-business.html

https://searchengineland.com/guide/what-is-seo

https://www.smamarketing.net/blog/what-is-the-purpose-of-a-bloghttps://themeisle.com/blog/history-of-blogging/#:~:text=Most%20experts%20agree%20that%20the,thoughts%20on%20the%20content%20within.

https://www.w3schools.com/html/html_responsive.asp

https://www.tiled.co/blog/what-is-dynamic-content

https://www.weforum.org/agenda/2016/08/who-owns-the-internet-and-who-should-control-it/

https://www.w3.org/People/Berners-Lee/

https://techjury.net/blog/mobile-vs-desktop-usage/#gref

INTRODUCTION.

hello everyone, welcome to my blog

A SOAPY SYNOPSIS

It is so nice to meet all of you! My name is Sophie Thompson, but my close friends just call me Soapy.

I am a 17 year old with a great interest in learning, crafting, and the arts. I am very much looking forward to learning more about blogging this fall semester! I love looking into blogs, but I never thought to write one for myself. There’s only so many readers that would be interested in a 2-page description on why Howl’s Moving Castle is a cinematic masterpiece.

This is an excellent opportunity to introduce myself to blogging and to build my understanding of the media! I can’t wait for all of the posts we’re gonna be making and for all of the new take-away I’ll pull from this class.