Adobe Slate

Adobe recently released a new iPad only app focused on creating content. One can then view this content in browsers on any Internet connected device. The content is displayed in a manner appropriate for that device. The app is called Slate (I placed the logo below). The tag line “Make your words and images move” sums up the purpose of this app.

Adobe Slate Logo

In a nutshell, I find this app makes writing fun (and makes me want to write more and more about various topics). I find this app very easy to use. For those who create newsletters or need to publish announcements, this seems like an ideal app. There are a number of pre-built themes and most include various animation capabilities. Let’s investigate the app a bit more. Read more »

Adobe Comp CC

Adobe recently released a new app for the iPad – Comp CC. In many ways, this app reminds me of Adobe Proto. There are a number of differences. The most important is that one can create low fidelity wireframes or much more detailed mock-ups of a web site, print document or a mobile app. I do wish this was also available for Android devices. For those who do have an iPad, the download is free. You should see a screen like the following when you search for the app on the AppStore.

Adobe Comp CC in the AppStore

Once you open the app, you will be prompted to sign in with your Adobe id. This is a good idea as it allows you to upload your work via Adobe Creative Cloud and you can also work with your prototype in either Photoshop, Illustrator, or InDesign. Let’s examine some of the basics of using this app.

Read more »

2 factor authentication

I recently provided a post on passwords. I mentioned that one should employ 2 factor authentication where possible.  Given that many readers and students may use WordPress as a blog platform (or for other purposes as it is a rather flexible platform), I thought it might be helpful for individuals to understand how to employ 2 factor authentication on their WordPress blog. Read more »

Wipster and Adobe Voice

I have been experimenting with the Wipster application for a few weeks. Essentially, this is a site where you post a video for others to review and approve. They can add comments in the video (as it plays). Although the service is not free, I am finding this to be very helpful for work I am doing with our student chapter of Web Professionals as well as within various courses I teach. What I find most beneficial is the use of Adobe Voice to generate short videos on a topic and then seek feedback via Wipster. Read more »

Office Mix

Assuming you are running MS-PowerPoint 2013 or higher, you might want to try Office Mix. It is a free add-on for PowerPoint which allows you to “create and share interactive online videos.” You can include screen captures, screen recordings, polls, and quizzes. You can upload your completed presentation to the Office Mix site (and make your presentation either public or private). On the site, you can review analytics regarding various aspects of your work. You can also create SCORM compliant modules for inclusion into your Learning Management System (for example, Moodle or Blackboard). If you would like to see examples of work created with Office Mix, there is an online gallery. Read more »


Passwords – “can’t stand them, can’t live without them.” We must access many computer resources every day and have to rely on passwords to verify we are who we say we are. I can’t count the number of times people ask me about what constitutes a good password. Therefore, I thought it might be appropriate to discuss passwords. Before proceeding, if you have the ability to utilize two factor authentication, do so. From a security perspective, we have three methods of confirming our identity:

  • who we are (fingerprints, iris, ears, voice prints, DNA, and so forth). If these are ever hacked or able to be reproduced, you have a significant problem. For example, it is very difficult to change your fingerprints.
  • what we know (this is where passwords come into play). We know a given value (a word or phrase) and use this to confirm our identity.
  • what we have (this is where two factor authentication comes in to play). For example, if we enable two factor authentication for a social media site, we enter a password and then receive a text value on our phone. We must then enter that unique value within a short time frame. Failure to do so means our access fails (even if the password was valid). If you are reading this and want to employ 2 factor authentication, there are several solutions. One is WikID.

So, what constitutes a good password? Read more »

Screen Capture Utilities

I have been helping a peer with one of their online classes this semester. They expressed an interest in learning about different tools to record the screen. I decided to take a different approach this week and provide this document I created for their use. This is an alternative approach to my typical weblog posts. I formatted the linked document using Adobe InDesign. The more I use that tool, the more I like it. One feature is the ease at which I can create a linked table of contents in the document. I hope readers like the linked document (it is a PDF file). I am curious what other tools should have been included in my list. What other suggestions would you have with respect to improving the linked document?

Related Posts Plugin for WordPress, Blogger...

Next Page »