Blog entry by Kevin Davidkin

Picture of Kevin Davidkin
by Kevin Davidkin - Tuesday, February 8, 2022, 3:29 AM
Anyone in the world

 Location

 You can change the location by searching for a different place or by drag an icon onto the map. If you are not connected to the internet, you cannot assign a new location.



 Photoshop can be used to create metadata

 Upload an image in Photoshop



 Click on the "File" button on the top menu. Next, select "File Info” from the drop-down menu.



 Include information in any of the fields, i.e. Include information in any or all of the fields, i.e. title, author information, description, and copyright information



 It is possible to save your time!

 Don't select "Save for Web" to ensure that your metadata is saved. This will erase the metadata from the image, thereby saving it at the smallest file size.



 possible.



 The preservation of your digital intellectual property is an essential part of preserving your artistic legacy and adds an additional layer of security for your data after it's



 Published on the internet. It's not just there to stay, as an academic gallery or museum professional will attest. But it could also be the last thing we are left with. Take care



 You'll be able to prove to your future self that you have maintained your data as current and as accurate as possible.




 What Gallerists, Artists, and Collectors Need to Know About Security of Data Security



 If you're an artist or gallery owner you're spending a lot of time online. From emails to expanding your network of friends

a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a

 Media following, being an artist or gallerist in today's hyperlinked universe demands a superior level of technological knowledge.

 a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a

 It is essential to ensure data security when working in the digital space. Hackers are more inventive and sophisticated in their attacks. Some hackers



 Some even claim that they are artists. It doesn't matter if it's phishing scams. Hackers don't make distinctions when it comes to the things they do.



 targets unsuspecting victim.



 These are some best practices that you can follow to ensure your data is as safe as it can be.



 Protect your social media accounts

 Hacking has become more prevalent on Instagram, Facebook, Twitter as well as other social media platforms. Instagram accounts varied from "macro--" to "macro."



 Influencers (500k+ followers) to micro-influencers (those with 10k-50k followers) have been able to see their handles change abruptly. There's no recourse.



 retrieve them other than frantically trying to reach the massive social media platform's never-ending support teams. No matter who you follow, it's difficult to



 Your social media accounts can be attracted by hackers, so count.