Moving Completely Over to the “Light Side”

apple-iieBack in the mid-1980s, my Dad bought an Apple IIe to help him manage his growing medical practice. That was the first computer I had access to. Eventually, he upgraded to an Apple IIgs — with a color monitor even! Knowing what Apple has become since the Mac and the iPhone, these tidbits of my early computer exposure now seem really cool.

But it was the 1980s. My Dad didn’t know then what Apple would later become. We surely didn’t know anything about being cool. Alas, he eventually made the decision to get a PC. I’m not sure of the exact specs, but I think the most capable PC processors in those days were the 386, eventually superseded by the 486 and the 486DX. Apple was a faint memory as we started learning MS-DOS and Windows 3.1.

Returning to My Roots

Fast forward to 2011. I had been designing for a few years with CorelDRAW 11 on a PC. My body of work included personal projects and volunteer work for my church. My portfolio landed me an interview and a temporary design job within the marketing department at Self Regional Healthcare. What was on my desk when I arrived for work? A Mac Pro with a 22″ Cinema Display. I realized after my first week that I had begun to come full circle when I tried to close a window on a Windows PC by moving my mouse cursor toward the upper left corner of the screen.

iphone_5s-black

That process of moving full circle was occurring in August of 2012 as I ordered a MacBook Pro for my business. Later that same year, my son traded a small fortune for a brand new iPod Touch (5th Generation). My wife then decided she would try out the iPhone after seeing her sister enjoy hers. The following Christmas, my other son received an iPad Mini. Without realizing it and without really straining for it, we had become an “Apple family” in just a couple of years.

The latest come-home-to-Apple moment was when I decided to jump on a mid-cycle upgrade opportunity and buy an iPhone 5s to replace my aging Motorola Droid RAZR MAXX.

So far, the hardware and software has been brilliant. I did have a SIM card programming issue that Verizon fixed quickly, but everything else has been great as expected. Many of the apps I used regularly on my Droid (Zoho Invoice, Evernote, Wunderlist, Pulse, etc.) are cross-platform. It was really just a matter of installing what I needed and logging in.

Conventional Graphic Design Wisdom?

All professional designers use Apple products, right? At least the good ones do. That is what I thought subconsciously. It just seemed that everybody who was producing really good work was using a MacBook or an iPad. And I guess, from all appearances, I’m perpetuating that generalization. But the truth is that while I was enjoying my new MacBook Pro, it was the PC that had put me in position to afford that MacBook.


When you observe the AJ Design mobile workspace, I have the shiny MacBook Pro. And yes, now I have an iPhone as well. But we would do well to remember that these tools are a means to an end. An Apple product never created anything. What a designer creates is far more important than the tool that he uses.

Password Security Is NOT Optional

If you own a website, there is a good chance someone is trying to hack it right now. Forget a website … if you simply own a computer that is connected to the Internet, you are probably being targeted. Is this some kind of conspiracy-theory-driven fear tactic designed to sell security software? No. Sadly, this is pure anecdotal evidence from the last 30 minutes or so.

One of my websites is powered by WordPress. To beef up security, I use a plugin called Wordfence. I got an email alert from Wordfence that my actual administrative username had been locked after 20 failed login attempts. Of course, I hadn’t tried to log in at all today, so I knew it was a potential attack. Sure enough, I was locked out of the site. But the site was secure. The hacker tried to get in but was met with a strong password (thank you, LastPass).

Wordfence has an intriguing feature called Live Traffic that allows you to see the IP addresses of any users or search bots that have recently accessed the site. I was curious to see the attempted login activity and was shocked to see that there were multiple login attempts from nonexistent admin-sounding usernames. I checked another site I manage and found a similar thing there.

I’m not scared, and neither should you be. But one reason I’m not scared is that my passwords look sorta like this:

j&4%”kshgHfgoO0wbh&$#Ondu6%$3h

And yours should too.

Learn the security options available to you for your website and/or your computer. Stay smart and prevent hackers from even attempting to access anything. But if all that fails and a hacker is knocking on the door, make sure you have a strong password. Use a service like LastPass.

If you use good security practices, you don’t have to worry about global, distributed brute-force attacks like this.

Infographic: A Visual History of Google Algorithm Changes

Snow Storm Pax has pummeled the Southeast United States for three days. It is now moving on to the Northeast, but we in the South are still reeling. Most 2-wheel-drive vehicles are safest in their driveways. Most businesses, schools and government offices are shut down. But for any self-employed folks with a to-do list calling, today is a day of catching up. OK, maybe it’s a day to catch up after spending the morning enjoying fun times in the snow with family or friends.

Before settling in for a couple of hours of moving forward on projects, I wanted to share this excellent infographic from Hubspot and Moz on the evolution of Google’s algorithm. If you own or manage a website, you will be interested to take this in. Click here to see infographic this full size.

A Visual History of Google's Algorithm Changes