Crowdsourcing Companies Likely Can’t Boost YouTube Views. Can Proxy Servers?

The old adage “If it seems to be too good to be true, it probably is”. That is, it’s NOT true. Crowdsourcing companies promise a lot more than they can deliver. Our previous post proved to be way too optimistic when we tried to get a couple of those companies to actually deliver those views. What we found was that some proxy servers MIGHT do so.

However, it seems that proxy servers are as much of a bag of snakes as crowdsourcing entities. We noted during our experiments with crowdsourcing companies that some of them proposed to use proxy servers, or actually did so, but they apparently did not succeed in adding more than a handful of views. That apparently was because YouTube is too clever, and they disqualified most of the views for a variety of reasons. For example, if the crowdsource operative used a proxy server located in a country other than his/her own (which they could tell if the visiting IP was from one country in one time zone but the time of the computer to which the IP was attached was set to a different time zone), YouTube disqualified those views.

The other challenge is that most proxy server folks want to be paid in Bitcoin. While you can use dollars or credit cards or gift cards at sites like Paxful, they can be pretty expensive.

The bottom line is that many owners of YouTube channels may find it too expensive and time-consuming to boost their view counts via crowdsourcing or proxy servers.

The Argy-Bargy About H-1B Visas is All About Dollars … At Tech Companies AND Universities

We at Technology Bloopers are not big fans of President Trump, but his administration’s putting pressure on tech companies’ hiring software engineers from India and China to replace Americans does seem to be consonant with his pre-election promises.

But apparently it is even worse than that. We heard a couple of days ago about one local company that not only hired a bunch of Indian H1B visa-holders, fired their American staff, and replaced them with these imported folks … after they were trained by the Americans. And this noxious practice has apparently been going on for some time, according to the Stateline folks at The Pew Charitable Trusts.

Three months of coder school is not much training compared with that of the better-trained—often in American universities—and more-experienced visa-holders. But why are these American universities welcoming these foreign students? It’s because those students come bearing big funds for their education. (At state universities, it is simply that the international students must pay the same (higher) prices as out-of-state American students.) We have heard that among some of these students it is said that PhD stands for “Parents have Dough”. Interestingly, those international students are more prone to cheat on their exams. Hmmm … does that mean that their future code will be less trustworthy than that of Americans?

We wonder why the big Silicon Valley tech companies have not done a better job on their own of training software engineers. Couldn’t they be hiring “junior” software engineers from the coder schools and boosting their capabilities with on-the-job training. We suspect one reason is that it is more expensive to do that than to hire foreign help. And more time-consuming. And another reason may be that they didn’t do a good job of forecasting their growth and concomitant demand for those software engineers. Maybe the current visa flap will motivate them.

But it may not be the fault of these companies. Americans may too lazy, or too afraid to be “uncool”, to study STEM (Science/Technology/Engineering/Mathematics) courses so there is not enough local talent to fill the needs of Silicon Valley. Graduates with strong STEM knowledge are polar opposites to “art history majors” , a term used derogatorily to connote enjoyable-but-low-paying jobs.

YouTube Takes Bigger Slice of Overall Television Pie

youtubevstv-550x309

Google is certainly getting a lot out of the $1.76 billion they spent buying YouTube almost exactly 10 years ago today. As of early 2013 YouTube was experiencing one billion unique viiewes/visitors every month, nearly one out of every two people on the Internet, use it for myriad purposes. Anyone at all can upload or watch videos of cats or dancing babies, and Google benefits because it can charge advertisers to put ads adjacent to those videos.

But either Google had great vision a decade ago or they have more recently realized that they have a great medium, arguably better than conventional television. However, a recent study by Nielsen and Google shows that YouTube and conventional (“linear”) TV may be more complementary than competitive. People are watching TV on YouTube and they are watching YouTube on their TVs, so the gap between the two media is shrinking. In fact, it is shrinking so much that Google has just signed up CBS for its imminent web TV service. And, notwithstanding some folks’ criticisms of CBS, its leader seems to be pretty savvy.

Gresham’s Law Trips Up Treasured San Francisco Stores Due to Skyrocketing Land Prices

greshamslawcomposite-550x434

You may believe that worldwide luxury brands such as Louis Vuitton, Gucci, and Hermes are like the GOOD money that would be driven out by the BAD money according to Gresham’s Law. But in this case these luxury brands are the bad guys. Like their always-empty stores in airports, these future ones in San Francisco’s tony Union Square are just very expensive billboards. And the independent retailers are the good guys (like Arthur Beren Shoes and Britex Fabrics). But even if it weren’t for the purchasing power of the most-valued of these luxury brands, the current craziness of Bay Area land prices would likely have raised the retailers’ rents beyond affordability, so they would have had to relocate or downsize or both. And even the luxury brands have no control over the mess being created by the new subway.

Those Who Live by Google Analytics Shall Die by Google Analytics

LiveByTheSword1 542x361

We at Wild Bill Web Enterpises have been tracking the visitors (and other metrics) for our three websites–including TechnologyBloopers, WhyMenDieYoung, and Wilddancer—on a weekly basis using Google Analytics and on a monthly basis using our ISP for nearly two years, and are baffled by the helter-skelter, all-over-the-map, random-looking numbers Google Analytics is providing us. Apparently this is a common problem, with a lot of possible causes, including some possibilities that could be our fault (well, the lack of useful guidance from Google and other sources isn’t really OUR fault). And it isn’t that our visitor volume is so high that we are the victim of Google’s sampling process. But we, and probably millions of other website developers, find it highly difficult, even impossible, to make any decisions based on this data. Why don’t the Internet and the Web take advantage of the huge computing power of the hardware and software to provide reasonably accurate statistics so that we can make things easier and more productive for both us and our visitors?

The Witches’ Brew that is YouTube

WitchesBrew1 490x468

Google presciently bought YouTube from its founders in October 2006, “betting that the popular video-sharing site will provide it an increasingly lucrative marketing hub as more viewers and advertisers migrate from television to the Internet.” Silly us. We thought that YouTube was something that individuals could use to entertain ourselves, and that popular ones would bring their originators (and Google) some (or a lot) of money from ads.

Well, Google sure isn’t making it easy for individuals, thanks to the messy combinations of accounts, email addresses, channels, and browsers that makes it a nightmare to find videos once you have more than one of each of these four entities. And to make matters worse, Google threw its failing Google+ social network into the brew. Using Chrome we find three channels (or are these accounts?)—Wilddancer, Beekeeping (thus far empty as we try to sort out the whole mess), and Bill Coggshall—associated with one email address, and two channels—Car Tunes by Coggshall (which started out as “Car Tunes” that YouTube allowed me to reserve then reneged and forced me to add “by Coggshall”) and bill@technologybloopers.com (strange-looking channel, no?)– associated with a different email address (bill@technologybloopers.com). Using Firefox we find two channels (or accounts?)—Car Tunes by Coggshall and bill@technologybloopers.com—associated with email address bill@technologybloopers.com.

Usability Testing: More Honored in the Breach than the Observance

BreachNotObservance 498x593

The Internet and the Worldwide Web have arguably changed the path of history. And they have made companies like Google into mega successes. But those companies have also caused much consternation among their millions of users. Why? Apparently they don’t bother to check with many (or any!) of those users to see how logical and self-evident their websites and associated tools are for their target audiences. Examples abound, and we will be posting some of the more egregious. But the Internet giants could have been even more successful, and keep website visitors on their sites longer (where they would be exposed to more advertisements) if their user interfaces were less opaque. The goal is usability, which is not rocket science. Two of most used tools are the Chrome browser and YouTube, which we will discuss in separate posts.

Ads Based on Recent Shopping Miss Their Target

TravelsmithMensPantsAndBlouse 541x298

I was shopping for MEN’s pickpocket-proof travel pants, and I must have visited travelsmith.com in my search. That was on Monday, May 2. Now, on Wednesday, May 4, EVERY site I visit—on searches totally unrelated to clothing—I am dealt a Travelsmith WOMAN’S Walkabout Knit Short-Sleeved Drape-Neck Top. I hope that Travelsmith is not paying Google (I am using Chrome) or another ad-dealing company very much for these ads. What is their logic? Do they think that I want to buy my wife this top (admittedly, at $27 it IS a lot cheaper than the pants)? Fortunately, after repeating this advertisement ad nauseum, Google graciously offered to let me fine-tune my ad preferences. Hmmm.

But there must be millions of other victims of these faulty algorithms. And some folks, such as the Wall Street Journal’s satirist Joe Queenan, are even more outspoken (e.g., in his ridicule of Amazon, Expedia, and Netflix).

Live by the Sword, Die by the Sword

GoogleDorking5 550x330

But it’s already too late to put the sword back in its place. The Internet, the Worldwide Web, Google Search, social networks, and other on-line miracles have given billions of people capabilities they never had dreamed of. But in their haste the makers of these tools have also enabled evil-doers capabilities beyond the masses’ worst nightmares. History is full of other technological advances that have been used for both good and evil purposes, but more recently cyberattacks have permitted individuals or small groups, sitting in safety at their personal computing devices, to wreak havoc on millions of innocent victims. These cyberattacks appear to be increasing in frequency and scope of havoc. Most recently several news sources reported the charging of an Iranian hacker on March 24 of his 2013 attack on a dam in Rye Brook, NY, which he found vulnerable using a technique called Google Dorking. (The wheels of justice certainly turn slowly … especially compared with the speed of computers and their hacker masters!)

Apparently he did not use his knowledge to operate the sluice gate of this small dam (perhaps because it was disconnected from computer control at the time). And although this dam is in a rather backwater community (pun intended) and not much of a threat to national security or even significant injury to people or damage to property, the ability of the hacker to infiltrate the computer system demonstrates a capability to attack a much bigger and more dangerous dam or other strategic infrastructure such as an electric power grid.

The really scary thing is that almost certainly many other sectors are under similar attacks. One such sector is hospitals. Within the last two months the computer systems at the Hollywood Presbyterian Medical Center, the Methodist Hospital in Henderson, KY, and the MedStar Georgetown University Hospital in Washington, DC were crippled by cyberattacks. These were not minor incidents; the overall MedStar 10-hospital group has 30,000 staff and 6,000 affiliated doctors. And patients in critical condition could die from the delays caused by inoperative computer systems.

Another sector is financial. On March 29 hackers breached the security at two large law firms whose giant Wall Street banks and corporate clients are constantly dealing with confidential matters, knowledge of which could net hackers millions of dollars through insider trading.

The general populace can only hope that the responsible governmental agencies are working hard to identify strategic facilities throughout the U.S. and its allies, and alert vulnerable ones so they can take steps to minimize the dangers from Google Dorking and other hacker nastiness. And also hope that “white hat hackers” (the good guys)–the modern-day equivalent of yesteryears’ vigilantes—step up their activities. It would help considerably if these strategic facilities would reward these hackers for their efforts.

Bloopers Beyond Technology: Theft of Bangladesh Funds is a Comedy of Errors and Law-Breaking By Humans

BangladeshMoneyLaunderedinPhilippines2snip 550x330
Technology does not exist in a vacuum. It is created by humans of varying degrees of ability and honesty. And technology involving the Internet is generally so complex, and created under time pressure, that it is more error-prone than more cautious and patient people would like.

According to the New York Times, slack security at the New York Fed (that’s the Federal Reserve Bank of New York), which most folks would consider a bastion of safe-keeping, allowed a bunch of money ($81 million or $100 million or some such sum) that rightfully belonged to poverty-stricken Bangladesh to be misappropriated by Chinese hackers and transferred to the Philippines, where in turn it was apparently transferred by above-the-law banks to putatively money-laundering casinos, who made it vanish beyond any chance of recovery. We’re not making this up. Mere prose and still images can’t do it justice. And no fiction writer could have imagined a more twisted tale.

The comedy continues if one reads the Zero Hedge blog, which apparently specializes in spreading misinformation of all sorts, including calling a spade a spade when it might not be. Entertaining to most of the world, but not to a few officials during whose watch this debacle occurred or to starving citizens of Bangladesh.