johnny.berlic got their new illustration or graphics by running a design contest:
Cartoon style building with a lot of Easter eggs
Check out johnny.berlic's Illustration or graphics contest…
We help real estate managers manage their access control systems making it easier safer.
What's your vision?
The image is to show 5 different use cases of using access control in a building. Each use case is magnified part from the picture with a numer attached to it so that a description of what is going on can be added in text outside of the picture. The magnifications are of the persons opening doors in the five scenarios. The use cases: 1. A business person is in front of a door to a large office on a floor in the building holding a mobile phone that shows an button on the display that says "Enter". The door has started to swing open. 2. A woman in business cloths is in the garage under the building. There are cars in the garage. The person is in front of a key cabinet (see pic Key cabinet) in the process of opening the cabinet by holding an access tag (see pic taggar) at the cabinet. 3. A teenager is in the middle of the building in front of his home apartment . It is an apartment floor with several apartments in the corridor. The person has inserted a key in a look to a door that leads into the apartment. 4. A technician dressed in work cloths with tools is in the cellar and is holding out an access card (see pic access card) towards the card reader on the heavy metal door (see pic offline reader). 5. A man dressed on ordinary cloths is at the main entrance and is holding out an access tag (see pic taggar) to a access control reader (see pic Access control reader). The picture should be in high resolution. It should two versions. One with just the building and one that is the building and the 5 use cases zoomed out from the picture. I the picture a lot of everyday activities should be going on. There is trees, cars, pedestrians and other details around it. It is in 3D, seen from an angel above the building (as in pic Example use cases access control 2). The pictures of the access control systems are provided to show the general shape of the equipment. It does not have to be depicted accurately. The reason for having the building as a separate image is to use it in presentations (see https://www.youtube.com/watch?v=M0k3giXi8eM) and there zoom to the use cases manually. That is why the resolution needs to be high so that it looks good when zoomed. Preferred style is as in this video https://www.youtube.com/watch?v=M0k3giXi8eM
Watch the video for the style we want and how we want to use the picture after wards. The more details and the more "fun" things going on in the picture the better.
US$349 Bronze package
Every design category has flexible pricing for all budgets. Illustration or graphics starts at $469.
Full copyright with production-ready files for digital and/or print.
It all began with a design brief.
A quick, interactive guide helped them understand their design style and captured exactly what they needed in their illustration or graphics.
Designers across the globe delivered design magic.
johnny.berlic collaborated with designers to refine their ideas
When design entries come in, you can rate them so designers know what you’re looking for in your logo design.
99designs has great collaboration tools so you can pinpoint and capture your ideas
And then… they selected a winner!
Along the way, they met lots of talented designers…
We think contests are a super fun way to get design.
Recently completed contests:
It provides mobile security systems for construction sites.
Louisiana Army National Guard Brigade Engineer Battalion. We have over 600 soldiers that take pride in their unit and th
Provide Security Services and Courtesy Patrols for Multi-Family Housing
I am young entrepreneur that would like to open a Worldwide luxury security company. I would an unusual and unforgetta
It’s a luxurious security company , That have agents for shops , offices... The logo will be on suits , jackets ... I
The average enterprise has 40 million security vulnerabilities--weak spots in their networks and on their devices that c