Logo & Branding
I started the rebranding process of Advoqt with Logo design. I redesigned the logo by doing the 3D geometric transformation of the “a” letter in Advoqt, which generated an optical illusion of being both indented and sticking out. I believe attractive graphic is the best world language that can leave a long-lasting impression. I also chose bright orange instead of the common blue often used in other tech companies, to make the design stand out.
• the different shade of orange creates an attractive 3d effect on the logo.
• visual illusion effect implies the new technology is innovative and versatile which could accommodate different needs and perspectives
• Instead of traditional symmetrical design, the cursor cluster is tilted to the left which could make the logo more distinguishable.
matrix composed of binary code (0 & 1) which resemble the basic elements in coding and machine learning.
• the little squares are assembling to form letter A, and you could also view it as the letter A is breaking down into little pieces.
• It is inspired by the movie “matrix” where the future world is constructed by lines of codes.
• It could also imply our company embrace diversity
• Using the coding element could visually show the company expertise to people
• White space in the center means the limitless possibilities coding could offer.
For the business card, I avoided wordiness and tried to give a clear and strong impression by highlighting the logo and keywords. I also left fair space at the back of the card for clients to leave their notes, which is was a very useful function according to the marketing team.
For the “HACKATHON” cybersecurity event poster, long paragraphs of description were required, because of the highly technical nature of the field. To make the poster easy to read, I kept the layout clear, broke down long paragraphs with bullet points and highlighted interesting facts. To save space for contents and also to make the poster more interesting, I inserted computer image on the edge. Green vertical lines of coding were raining down from the computer screen, signifying a hacked computer and emphasizing the importance of cybersecurity.
For the Powerpoint, I worked closely with the presenter and made sure each slide had the right amount of information to support a smooth pace. In some case, I needed to incorporate a large amount of information into one slide. I used animation to separate the contents and transformed some contents into the data table and infographic.