Select Page
Password Wallets

Password Wallets

December is already upon us. WOW. Let’s take a moment and focus on security. After all, passwords are like underwear – they should be changed frequently. Sure, I get that. And I can set all my passwords to either:

  • be the same across all sites (definitely not a good idea), or
  • ignore this advice and never update my password (also, definitely not a good idea).

OK, what if I want to change my passwords periodically but suffer from any sort of memory issues. How can I:

  • use a unique password for each site I use,
  • keep my passwords (actually passphrases) long and complex, and
  • remember to change them from time to time?

Short answer – use a password wallet.

What is a Password Wallet?

In the same way you probably keep your folding money in an actual wallet and keep it close to you, a password wallet is a secure spot to store your passwords. It is a bit of software. It can be available only to you (perhaps on a USB drive – you recall those, don’t you) or it can be stored in the cloud (someone else’s computer). Regardless, access to the password wallet is controlled by a password (or preferably, a passphrase). Unless you know the password/ passphrase to access the wallet, the contents are not readily accessible. In a similar manner, the folding money in your wallet is not readily available to the world. Generally, contents in a password wallet are encrypted. This means if the data store is ever stolen, it is not of any use unless one knows the access word or phrase.

Yes, many browsers provide the ability to store your passwords these days. Many operating systems also provide this capability. That is always one alternative. Although we are not recommending/ endorsing any specific technology, it is important to know what options are available beyond your browser or operating system. Some examples of password wallets include:

  • KeePassXC (you can store your access credentials on a thumb drive). This software is open source and OSI certified.
  • LastPass (there are free and paid versions).
  • NordPass (if you use Nord as your VPN, this paid version may be appropriate).

There are many other choices, Search engines are helpful, aren’t they?

Selection Criteria

Once you decide to that it might be useful to store your passwords in a secure wallet, here are some things to consider (this is not a complete list).

  • How secure is my data? Does the wallet securely encrypt the contents? If you forget your password/ passphrase, you will likely not be able to access the contents. Confirm that no one can decrypt the contents (particularly if the password wallet is online).
  • Is there a limit to the number of passwords/passphrases I can store? Some free versions limit you to 50 or 100 passwords. Of course, you get what you pay for.
  • How much does it cost? Yes, many of these services cost. That is how they keep their software up to date (defending against the most current known vulnerabilities). Many services offer a discount if you pay annually.
  • Password/ passphrase generator? The longer the password/ passphrase, typically the better. You should be able to specify the length. Also, you should be able to copy the information for a short period of time. When you use longer passwords, it is helpful to copy, then paste the contents into your browser. But, you don’t want that information remaining in your clipboard too long.
  • What other services are included? Many paid options offer additional services (such as multi-factor authentication, or being able to selectively share information with family or co-workers). You decide what is necessary for you.
  • Reminder to periodically change your password? It is a good idea to periodically change your passwords. Typically, we forget to do this. It is helpful if your software provides you with the ability to set a reminder for a given site.

Should I use one?

Ultimately, that decision is up to you. However, these days, one needs many passwords (and they should be unique for each site). Personally, my memory is simply not capable of remembering passwords for thousands of sites. And you want to make certain you periodically change important passwords. Those item alone likely dictate you should consider such an approach.

All this being said, I strongly recommend using 2 factor authentication in addition to a password/ passphrase on any given site. This means you must provide both your username and password along with a unique code to access a site. Most sites offer this option. Many allow you to use a technology like Google Authenticator or to receive a SMS text message with a unique code. These codes are typically only good for a minute or so.

 

November, 2022, Desktop View

Here at Web Professionals Global, we hope everyone has been experiencing a successful November. It is time again to focus on a few items which caught our attention during the month. We never cease to be impressed at how quickly web technologies change. Let’s briefly focus on these areas for now:

  • CSS,
  • Accessibility, and
  • Security

CSS

Browsers are beginning to support media query range syntax. Sure, it is not supported in all browsers on all devices yet, but knowing this is coming is huge. It should save significant time coding CSS. Instead of having to specify specific media sizes, we may soon be able to employ mathematical symbols such as >, <, <=, and so forth. Perhaps we can avoid min-width and similar bits as this is supported more and more. Readers are encouraged to follow the above link (it will open in a new tab) to learn more. Please let us know what you think about the possibilities of this via comments.

Accessibility

Adrian Roselli posted an article earlier this year on buttons, enter and space.  From a user experience perspective, this is a great refresher on what happens when you use native keyboard interactions. Adrian even provides a working example (with counters). His last word in the article is something we advocate all the time – test. What are your thoughts about keyboard interactions?

Let’s not overlook e-commerce accessibility either. We came across this article specifying UI elements using roles. As many of our readers know, specifying the purpose of UI elements is critical when visitors to a site rely on assistive technologies. We thought this article provided a great number of insights and examples. We look forward to your thoughts on this topic as well.

Security

As we approach the end of the year (and many of us have to provide tech support to family and friends as they receive new devices), it might be wise to bookmark the OUCH newsletter site. Disclosure, Mark (your executive director)  is one of the monthly reviewers of these articles before they go live. Each month, a security professional provides a timely overview of one aspect on security. Articles are kept short and are suitable for sharing with those not as savvy in various aspects of technology.

That is all for our November desktop view. We know your time is valuable and appreciate you reading this post. If you would like us to include additional articles or focus on additional aspects, please let us know via your comments below. Until next time…

Best always,
Mark DuBois, Executive Director
Web Professionals Global (aka World Organization of Webmasters)

October, 2022 Desktop View

It has been some time since I posted some thoughts on the current state of web technologies. A lot has happened during recent months. Let’s focus on several key areas:

  • web accessibility,
  • security,
  • JavaScript,
  • and CSS.

More areas may be the focus of subsequent articles. Stay tuned. As always, we at Web Professionals Global are interested in what you think. Let us know in the comments or contact us directly.

Web Accessibility

WCAG 3 has been released as a draft (published in December, 2021). Latest editors draft updated as of July, 2022. The approach is iterative with content ranging from temporary (just a placeholder for future content) to mature (ready for publication). This version is somewhat evolutionary in that it will be easy to understand and provide guidance. A key differentiator is that this version has a broader scope (beyond web content). I encourage you to view the above links and consider helping develop the next version of Web Content Accessibility Guidelines.

Of course, there is also a new ARIA authoring practices guide website. Lots of patterns and resources. Check it out.

Security

This is a bit beyond web security, but definitely something readers should be aware of – ransomware attacks which target home PCs (delivered by fake Windows 10 or anti-virus updates). This is called Magniber (details can also be found at this ZDNet article). Essentially, a visitor is directed to a website (although it looks legitimate, it is controlled by malicious individuals). That site informs the visitor their computer operating system or software is out of date and they need to update it as soon as possible. The visitor is tricked into downloading a malicious JavaScript file which contains the malware payload. Once installed (via as technique called DotNetToJscript) the individual’s hard drive is encrypted. They are directed to a link to negotiate payment to recover their contents. More details can be found in the above article.

As web professionals, we should remind ourselves (and our clients of some fundamental tactics which help mitigate these sorts of attacks.

At a minimum, never act on anything that purports to have an extreme sense of urgency. That is what malicious individuals want. Act before you have a chance to think about the implications. It is also good practice to never click on links in emails or text messages. Instead, open a browser and type the site directly (or use a reliable search engine). Lastly, only install updates from trusted sources (and use the traditional channels where those updates are distributed).

JavaScript

The creator of JSON made an interesting comment about JavaScript a couple months ago. Douglas Crockford stated that “The best thing we can do today to JavaScript is to retire it.” Yes, JavaScript is the world’s most popular programming language (used by over 65% of developers according to a StackOverflow survey). Yes, it is bloated (and is becoming more so over time. However, it powers the majority of web sites. Of course, JavaScript is supported in every browser so making a change to something else would be a monumental undertaking. We are curious what your thoughts are about JavaScript. Is Douglas Crockford correct? Please discuss in the comments below.

CSS

Remember the days of aural style sheets (yes, they were a thing). Of course, no browsers supported them. However, a recent article (October, 2022) has raised some hope for me again. Why we need CSS speech is the article. What are your thoughts about CSS speech? Again, reach out to us in the comments.

Of course, there are many enhancements in the works for CSS. These include items such as:

  • The ability to nest selectors is presently in the works. This is possible a good way to organize your CSS code. Of course, no browsers yet support this.
  • Cascade layers (which give authors the ability to group their CSS and affect how the cascade applies). The linked article should give you a much better understanding. This is like nesting selectors, but much more. Is this feature ready for prime time? No, but you might want to start learning about them.
  • CSS subgrid allows for styling on a page to inherit the parent’s grid styling. MDN has a nice overview with examples. That is the reference linked at the start of this bullet.

Now you know a little more about what is happening with respect to web accessibility, security, JavaScript, and CSS. Please let us know if you find this information helpful and provide more thoughts in the comments below.

Best always,
Mark DuBois, Executive Director
Web Professionals Global (a.k.a. World Organization of Webmasters)

 

 

July, 2021 Desktop View

This month, I thought it appropriate to post some of my thoughts concerning web and security. Unless you have been unconscious for a while, you have seen so many news articles about ransomware attacks on various corporations. Since many readers work with clients (both internal and external), here are some of my thoughts regarding security. The sad thing is that most of these attack vectors are nothing new. They have been employed for some time, yet some people still fall victim.

I am focusing on what you can do as an individual. Obviously, this is a very large topic and I am just touching on some of the highlights as I see them. I look forward to your comments and encourage further discussion in our member Slack channels where we can focus on more specific items).

Passwords

  • Passwords should be long and complex. If in doubt, length wins over complexity. Consider using passphrases.
  • Passwords should be changed on a regular basis. You decide on what is comfortable for you.
  • Passwords should never be reused on more than one site. Never. There is no reason why you need to do this.
  • If you can’t recall passwords, use a password vault. There are a number of alternatives. Just make certain it is secure and your passwords are updated in the vault as you change them.
  • Passwords should never be shared with others. Never. If there is some unusual situation where another must access your information, change your password, give that party the new one, then change the password again once the need for their access has passed. Frankly, I can not think of any situation where this is warranted, but…

email

  • Never open links included in email messages. If you receive a link to a website (such as a banking site), open a browser and type the URL. It is so easy to spoof website addresses these days. That is why you should manually enter any site URL where you are required to authenticate.
  • Unless you are expecting an attachment from someone, never open email attachments. Never. This is where most malware gets started. I recommend using some form of online storage (which is virus checked) if you must share documents these days.

2FA

  • Whenever possible employ two factor authentication as part of your login. In a nutshell, there are three ways to prove you are who you say you are – something you know (like a password), something you posess (like an authentication app), and something you are (like facial recognition or fingerprints). I recommend using the first two in combination since it is very difficult to change your bio-metrics.

Phone calls

  • I recommend activating the feature found on modern mobile devices which only allow for incoming calls from those in your list of contacts. Anyone else must leave a voice message. Most scammers rely on a sense of urgency to get you to take an action you would typically not do (for example, say “yes” or share a password. Review the voice message and only call back if you are certain you need to speak with the individual leaving the message. Most scammers will likely not even leave a voice message. I assure you, the sheriff’s department will never call you to let you know they are coming to arrest you. It is best to delete similar junk.

Final thoughts

I know this list is not complete, and should be obvious to readers. However, it never hurts to review the basics periodically. Always apply a healthy dose of skepticism when anyone contacts you and asks you to take action. The more immediate their request, the greater the likelihood it is a scam.

June, 2021 Desktop View

As we begin another month, here are my thoughts regarding what is happening in our industry.

This month, my thoughts center around longevity. Hope you find this information useful. In case you are curious, I built my first web page in 1992 (yes, 29 years ago). It no longer exists, nor does the company where I built it at.

I am already looking forward to your comments.

Ageism

My colleague and friend, Tom Green, recently posted an article on LinkedIn.com about this last acceptable prejudice.After you review the article, let’s start a discussion in our Slack #general channel about this topic. What are your experiences? Does Tom’s article resonate with you? Why or why not?

CSS

Eric Meyer reflects on 25 years of CSS. Has it really been that long? If you have a moment, please post a comment reflecting on your first use of CSS. Consider a discussion in our Slack channel as well. What are your thoughts on the past 25 years of CSS.

WordPress

Speaking of longevity, WordPress turned 18 in May. Isobel Weston has a great overview article at NameCheap. From a simple blogging platform to a technology which powers nearly 41% of the WWW these days. And it only took 18 years to get to this point. Makes me wonder what the next 18 years hold for this technology.

Annual Web Competition with SkillsUSA

Speaking of longevity, this year marks the 19th year for our national web competition held in conjunction with SkillsUSA. Our first year (2004) was a demonstration contest. This year will mark our first large scale virtual competition. We did a smaller competition in 2020 as the pandemic raged. This year, we have over 20 teams competing at secondary and post-secondary levels. Winners will be announced near the end of June at the above site.

I am curious – now that you have read this far, what information would you like to see next month? Please tell us via the comments.

May, 2021 Desktop View

Note from Mark. I plan to periodically provide article summaries and insights. I am hoping this will happen once each month. Hope is the operative word. Here are my thoughts as we begin May, 2021. I welcome your comments about additional topics you would find helpful as well as your thoughts about these articles. I found them most interesting/ thought provoking.

Accessibility

Using Modern CSS to Improve Accessibility. This article by Stephanie Eckles provides a quick overview of what it means to have an accessible website. Stephanie then covers using some of the newer CSS to enhance accessibility. This includes use of outline-offset to position the outline away from the element. The focus-visible pseudo-class will display an outline only when the user agent determines it needs to be visible. There is so much more in this article, I encourage you to set aside time to read it in its entirety and digest how these CSS features can be used to solve real world accessibility issues.

A.I.

GPT-3 is a language supermodel which is quietly ushering in the A.I. revolution. This article by Luke Dormehl explains why this text generating algorithm makes a difference. The main difference with prior algorithms is that limited training is required. In the past, significant input was required for A.I. to “learn.” This no longer seems to be needed. Think. About. That. Here is a key quote from the article (it certainly resonated with me).

“Machine learning has been transformative in all sorts of ways over the past couple of decades. But machine learning requires a large number of training examples to be able to output correct answers. GPT-3, on the other hand, has a “few shot ability” that allows it to be taught to do something with only a small handful of examples.”

Ok, Mark, what does all this A.I. have to do with Web design and development? One example mentioned in the article is a layout generator which”renders a functional layout by generating JavaScript code from a simple text description.” Another example is a GPT-3 based search engine. I think you will find this article most interesting and informative. Our industry is changing and A.I. is going to have a major impact. Plan accordingly.

FLoC

Federated Learning of Cohorts is Google’s replacement for tracking cookies. Our advisory board member, Deborah Edwards-Orono, has a great article about this effort and her concerns. Simply put, FLoc is included by default in the new version of the Chrome browser [see our recent post on the popularity of this browser] and collects your recent browser activity. It takes that activity and labels it then shares the “cohort” with other websites and advertisers. The main concern with this approach is privacy. She also discusses a new WordPress plugin Disable FLoC which is easy to install and has no configuration settings, it just  does what it claims to do. If you would like to learn more about the implications of FLoC, the Electronic Frontier Foundation has a solid overview as well.

For those not using WordPress, Marko Saric has an overview article at Plausible which also includes the snippet of code you can add to your .htaccess file to disable FLoC as well.

Future of the WWW

Professor Sir Tim Berners’Lee (inventor ot the WWW) thinks his creation is out of control. In this interview, he explains his plans to save it.The big issue these days is privacy. He proposes Solid (a new system to decentralize the Web). His core idea is PODS (Personal Online Data Stores) which each person has control over. The fundamental change is that anyone wanting to use your information must ask for your permission. After you review the interview, I would be keen to learn your thoughts about this approach. Comments are open.

Hardware

Gizmodo recently discussed the fact that Verizon is recalling 2.5 million of its hotspots because they are literally too hot. There have been 15 reports of the devices overheating (6 instances of fire damage). Review the article to see if  you have one of these hotspots (various models sold between April, 2017 and March, 2021).

WordPress

Easy WP Guide has been released for WordPress 5.7 (most current version). No discussion of PHP or the technical details, just a comprehensive guide to help you edit the content of your site. This is a free download. Web Professionals who build sites using this technology may wish to share this document with their clients (if you haven’t already). You can purchase the guide which allows you to brand it as you wish.

For those developers using Elementor as part of their WordPress installations, you may wish to review the recent Wordfence post discussing recent vulnerabilities with Elementor.  For those who are not aware, Elementor is installed on over 3.5 million WordPress sites. The Wordfence team found over 100 vulnerable endpoints.

Final thoughts

Hopefully, you found these articles and insights helpful. What else would you like to see in future articles? What did you think about these? I look forward to reading your comments.

Best always,
Mark DuBois, Executive Director
Web Professionals (a.k.a. World Organization of Webmasters)

Successful 16th Annual Web Contest

Successful 16th Annual Web Contest

We believe 2019 saw our most successful web design and development competition ever. We held this in Louisville, KY, during the last week of June. Our competition is one of 103 individual competitions at SkillsUSA Nationals. Competitors must win first place in their respective states for the opportunity to compete nationally. We also choose one winner from these competitions to represent the US at WorldSkills. That competition is held every two years (and the next will happen this August in Kazan, Russia).

Our on site team

We are so appreciative of the massive efforts by so many members of Web Professionals to make this competition a reality. We have our team on site for almost an entire week. They conduct the interviews of competitors (and these mimic real interviews as many of the individuals conducting the interviews hire web professionals as part o their daily jobs. They also review the process each team follows as they provide solutions to the business problems posed in our competition work order. They also make certain the server and network environment is running smoothly and that all tams can access their individual server, cloud storage, and editor. This can be a particular challenge when some teams bring school computers which have been so locked down one can not even access the Windows Control Panel. Our team also develops the competition project/ work order and configures the environment before the competition. We are so thankful for all the help and could not do it without you.

Our onsite team of Web Professionals who make certain the competition runs smoothly. All are standing in front of our contest banner and promotional banners.
Our onsite team (from left to right) – Grant, Steve, Mark, Jonathan, Jeff, James, and David.

Our judges

We run two separate competitions (Wednesday is for high school students). We had 52 individuals competing this year. Our Thursday competition is for college students. We had 20 individuals competing this year. When the competition ends each day, we transfer all the work by each team to a secure location on one of our web servers. Judges from other states can then review the work of each team. Our judges are practicing web professionals and we have more than one judge review the work of each team. Each judge focuses on a specific area (such as accessibility). All scores are collected and finalized by the following morning. We could not achieve all this without our off site judges. If you are reading this and would like to help (or would like more information), please contact us. We can always use more judges.

If you are interested in overall comments from our judges, we provided a summary for competitors to review on our separate Web Design Contest site.

The competition environment

For those who would like to learn more about the environment we utilize, we prepared a couple of articles on our Web Design Contest site. These are listed below.

  • An overview of the server environment covers the fundamentals of how the server is configured using containers so that the work of each team is separated and secure.
  • An overview of the network environment covers the fundamentals of how competitors access the local resources. Given the logistics of where the event is held, it is simply not feasible (nor cost effective) to offer actual Internet access to competitors.

Training

Before the competition begins, we offer training to competitors and their advisors the day before (Tuesday). This is our opportunity to make certain everyone has a solid understanding of current industry best practices as they relate to web design and development. It also gives competitors and their advisors the opportunity to ask questions and develop a better understanding of what the competition is all about. In the photo below, Jonathan is discussing process best practices.

Jonathan discussing the overall process practices for web design and development to roughly 100 competitors and their advisors.
Jonathan provided an overview of process best practices to competitors and their advisors.

WorldSkills Competitor

We also had our WorldSkills Web Design and Development competitor (Matt Vreman) speak to competitors and their advisors before the competition began. He discussed his background (he won gold at one of our prior competitions). Matt reviewed his progress as he prepares to compete in Kazan, Russia in August, 2019. I will be accompanying him as his advisor in that competition (each country is allowed to bring in one expert to help their competitor). There will be roughly 50 countries competing in Russia in web design and development.

Matthew Vreman answers questions from competitors and their advisors prior to the start of our competition.
Matthew Vreman (WorldSkills competitor in web design and development) answering questions

Contest Impact

This was our 16th year running a national web design and development competition. A lot has changed in our industry over that time. We like to think that our competition has kept pace with changes in our industry. Over these years, we have had the chance to speak with roughly 2,000 competitors and their advisors/ teachers. We believe that we are making a difference in that competitors and their teachers see what current best practices are and many have adjusted their curriculum accordingly. We see these trends continuing based on the feedback received this year (particularly from advisors). We could not do this without the help of our members; they serve in many roles (including judges and on site team). However, members also provide the funding (through their annual membership dues) to help us achieve our goal of insuring that the next generation of web professionals is following current industry best practices. We couldn’t do this without your support. If you are reading this and have not yet become a member, we encourage you to support us in this endeavor.

Best always,
Mark DuBois
Executive Director and Lead Community Evangelist

Smart Speaker Eavesdropping

Smart Speaker Eavesdropping

Perhaps you have one of those Alexa or Google Home devices (or are considering one). Ever wonder how it becomes active when you speak the “magic words” such as “Alexa?” Obviously, it is listening in order to know when you ask it something. These devices are just part of the connected Internet of Things (IoT) we encounter more and more in our daily lives. But, you do realize these smart speakers are eavesdropping all the time?

Smart speaker listening in the background (behind a house plant)
Smart speakers always seem to be listening

Sure, you can “opt out” of this listening. But you have to take an active role to do so. In some states, legislation is being considered to require companies (such as Amazon and Google) to obtain explicit consent from customers before those voice queries are recorded and stored.

Illinois has proposed legislation

In Illinois (where Web Professionals is headquartered), our State Senate passed the Keep Internet Devices Safe Act in the Senate on April 10. The measure is now before the Rules Committee in the Illinois House. In a nutshell, this legislation (if it becomes law) directs that the user must first agree (in writing) to specified criteria. The exact wording – “Provides that no private entity may turn on or enable, cause to be turned on or enabled, or otherwise use a digital device’s microphone to listen for or collect information, including spoken words or other audible or inaudible sounds, unless a user first agrees to a written policy meeting specified criteria.”

California has proposed legislation

In California similar legislation was proposed earlier this year (February 22). This is also making its way through the legislative process. This proposal also bans smart speaker vendors from sharing this information with third parties without consumer consent (opt-in).

Does eavesdropping matter?

Is this a “big deal?” Bloomberg reported that thousands of Amazon employees listen to Alexa recordings. Of course, this is to help the technology better understand what we are speaking. However, employees (or contractors) may also overhear potentially criminal activity or words the speaker may prefer remain private. As we learned from the Bloomberg article linked above, some words (such as French “avec sa”) may be interpreted as “alexa” by the listening device. Personally, I have observed words emanating from my television causing the lighted ring on my Alexa device to indicate it is listening (and it often tries to respond appropriately).

We support these initiatives

As many readers are aware, legislation continually plays “catch up” with technology. The smart speaker example is the latest of these issues. Obviously, legislators in Illinois and California are paying attention. In the broader scheme of things, we at Web Professionals believe privacy matters. We support these legislative initiatives.

If you would like to learn more (especially about the California initiative, PC Mag has a great overview article. We are curious about your thoughts on these initiatives. As always, we look forward to your comments.

Introduction to Digital Asset Management

Introduction to Digital Asset Management

Any professional who works at creating, managing, or marketing a website understands how important digital assets are in their work. Digital assets are electronically stored data that come with the right to use, bring value to their owners, and are uniquely identifiable. Examples of digital assets include audio files, PDF white papers, graphics, photos, HTML documents, and presentations.

Individual viewing computer monitor with a title overlay of digital asset management

Web professionals can use these assets to help educate people on a topic, improve a company or organization’s digital presence, and market products or services online. However, as the number of stored digital assets grows at an organization, it becomes time-consuming and difficult for different web professionals to manage and retrieve assets.

A digital asset management (DAM) solution is a type of software that helps web professionals properly store, update, index, and retrieve their digital assets. The demand for dedicated DAM tools is expected to surge over the coming years, and recent research predicted the global DAM market to reach $8.1 billion by 2024.

Read on to find out the types of DAM available, the service models you can implement when using DAM systems, and some specific use cases of DAM software for web professionals. You will also get some tips and best practices for getting the most out of any DAM solution.

Types of Tools

There are three main types of Digital Asset Management tools; however, many enterprise solutions can be classified and used as any single one or as all of these types simultaneously.

  • Library asset management focuses on building an organized digital library of infrequently changing assets for easy storage and retrieval.
  • Production asset management meets the needs of web professionals who need to collaborate on, control and use digital assets that are frequently updated and revised.
  • Brand asset management entails using and reusing marketing materials, logos, and other assets that help to build brand identity.

Software Service Models

There are two main service models for implementing Digital Asset Management:

  • On-premise DAM solutions are installed locally on an organization’s servers. Everything is kept in-house and users typically access assets via the internal corporate network.
  • Cloud DAM solutions are hosted on external web servers and the software is accessed through a web browser via an Internet connection.

On-premise DAM systems are better suited for web professionals whose roles involve stringent data security obligations, such as people working in government departments and highly regulated industries. A cloud DAM is a cheaper, more flexible solution that can also facilitate the needs of distributed teams and remote workers.

Benefits of DAM for Web Professionals

Web professionals work in a wide range of roles, but here are some general benefits of DAM software for all web professionals:

  • DAM software reduces time spent looking for assets, improves workflows, and facilitates quick repurposing of digital assets. The result is greater productivity.
  • By building a central repository of digital assets and using versioning controls, DAM provides asset consistency and facilitates collaboration for web professionals.
  • DAM software tracks the usage rights associated with assets, which can help reduce the risk of copyright issues from improper asset use. For example, there might be restrictions in how you use purchased stock photos.
  • Cloud and on-premise DAM software typically come with access control, meaning you can secure your most sensitive assets and make sure that the only people with access to them are those who need such access to do their jobs.

Best Practices When Using a DAM System

DAM offers many benefits for web professionals but how you use your chosen tool can make a huge difference. Here are some best practices for getting the most from DAM software.

Metadata is Critical

Metadata is information about your assets. Your DAM software is only as good as the metadata you store with each asset. There is a balance between too much metadata and too little. You need to enter the most important information about every asset you wish to catalog because metadata is what turns a piece of digital data into an easily searchable and retrievable asset.   You should also have a policy to enter metadata into the system as soon as you upload a given asset. Procrastination leads to an inefficient setup that makes it hard to find assets.

Specify Usage Terms

Assets rights issues can easily emerge when an asset has been stored without reference to its usage rights. For all rights-managed assets, it’s imperative to specify the usage terms in their metadata.

Leverage Analytics

DAM software often comes with advanced tracking and analytics features. You can use this information to your advantage, for example, marketers can identify the asset categories that bring the most ROI to your organization. You can also use the analytics to identify assets or collections of assets that are most frequently used and try to make such assets more easily discoverable.

Assign an Administrator

Particularly in large organizations, it is prudent to have a dedicated DAM administrator. This person can manage access controls for different users and ensure user roles and permissions are kept current. The administrator should also be responsible for creating and deleting users from the system.

Train Users

When you adopt a DAM system, it’s a good idea to set up a dedicated half-day of training that teaches different web professionals in your organization how to use your chosen software. If you avoid training users, they will need to learn on the job, which can lead to a lot of frustration and lost productivity.   

Conclusion

The expected growth in the DAM software market reflects the growing influence of digital assets in the daily work of various web professionals from designers to marketers to website copywriters. Cloud DAM solutions have emerged as a lower cost alternative service model for DAM, however, on-premise systems are still the standard for professionals in government departments and highly regulated sectors.

Editor’s Note: This sponsored content was provided by Gilad Maayan (Developer Community Advisor) at Agile SEO.

What Designers Should Know About Website Branding

What’s a brand?

It’s a symbol or object that communicates the company’s proposition about its products and services and differentiates it from its rivals. A brand encompasses:

  • Logos
  • Design
  • Advertising tone

Why website branding is important

Creating a strong brand for your client’s website can give them a distinct advantage over their competitors. With branding comes recognition. This leads to familiarity, which can earn a customer’s confidence and trust.

However, building this kind of loyalty may take time. A website visitor may need multiple exposures to the brand. So, put simply, by helping your clients deliver a consistent brand message, you can boost their chances of success. What is more, you will increase your opportunities of getting repeat business from them.

A website essentially serves to:

  • Sell products or services
  • Generate leads
  • Promote sales
  • Attract visitors or subscribers
  • Generate a healthy return on investment (ROI)

Through strong website branding, a company can deliver a clear message that achieves all of the above as well as building loyalty and trust from its customers.

To help your client develop effective website branding, follow these tips.

1.     Color creates moods

Color is more than aesthetics; it can stimulate emotions and stir people’s subconscious in relation to the company’s brand. For example:

  • Red – symbolizes energy, excitement, energy, and passion. If your client is in the entertainment business, for instance, red will work well for their brand.
  • Green – symbolizes the environment, nature, health, money or profit. If you’re working for a hospital or clinic, using a pale green background would be appropriate for their site.
  • Orange – symbolizes fun and adventure. For example, detype.com uses orange liberally on its site from the background to headings, and links. As a web design company this indicates that it’s enthusiastic and outgoing.

Before choosing a color for your client’s site, consider doing some research about its effects and appropriateness to the brand. Also, remember that each culture may view the same color differently. So, you should check the target market’s reaction to the colors used in your proposed website design.

2.     Brand personality

Injecting some personality into the website helps to zero-in or define what your client’s brand represents.  One way you could introduce personality is using a character or persona to represent the brand.  Twitter’s bird logo is a good example. People recognize the social platform’s mascot immediately.

3.     Emotional connection

Creating websites that stir visitor’s emotions can help your client’s brand messaging. As you design the site, decide what kind of feelings or emotions you want visitors to experience? For example, DeType displays attractive imagery to showcase the creative talent of its web designers.

4.     Uniformity

To make a brand memorable, you need to make the website design consistent.  So consider keeping all the site’s colours, character, and emotions consistent on every page.  Take a look at Skype’s website. Every page shows the same look, reinforcing its brand.

5.     Reusability (code and visuals)

As well as using consistent visuals and layouts, you can reuse content such as style sheets or images. As the files are in the browser’s cache, this will consequently make your site load faster.

6.     Make the logo highly visible

Considering placing the logo at the upper left corner of the site, since this is the spot where most visitors’ eyes will be drawn.  Also, consider linking the logo image to the site’s page. As for size, ensure that it is big enough to be noticeable, making it at least the second or third object visitors see on the site.

7.     Promote the benefits

Visitors won’t stay long on a site if it fails to grab their interest.  It will only take seconds for them to find out if they have come to the right place. To convince them to stay, tell them what benefits they can get from using the brand’s product or service in a few succinct words. The best location for this message is next to the logo so that people can see it immediately.

8.     Adopt and use the right tone

Even the website’s language can strengthen a brand’s appeal to your target market. For example, there are various tones and combinations of tones you can adopt:

  • Formal voice for a site catering to investors
  • Informal and fun voice for young audiences
  • Friendly voice with related industry jargon for a tech-savvy audience

Also, be mindful that some words can have different meanings, depending on the audience. Take  the word ‘engine’, for example:

A Mechanical Engineer will describe an engine as “a device which converts fuel or heat energy into mechanical energy”. A Computer programmer, however, will associate an engine as being  “software which generates source code in order to create automated processes.”

9.     Make the site stand out

Creating a website brand won’t create any impact or differential if it is the same as other competing sites. As a designer, you need to include elements that will make your client’s site unique. After all, by making the site stand out you’ll improve the brand’s chances of attracting visitors and making them return.

Conclusion

Building a strong recognizable brand, even for small business or personal websites, is a must in this digital age. This is especially important, given the short attention span of visitors and of course the sheer number of businesses that have an online presence.

Strong branding can instantly demonstrate the attractive advantages of your client’s brand, its key differences to competitors and its unique personality and character.  Getting across all of this can help clients in a big way, to not just win over customers but beat their competitors.

As you can see from the tips covered in this article, there isn’t just one single route you need to arrive at a strong brand but a range of directions. So, keep these all in mind when you embark on successfully branding your client’s site.

About the author:

Sam Sayer is the Creative Director of DeType, a creative agency based in Kettering, Northamptonshire, UK. His company specializes in web design, branding, motion, UX, and online design.