Date Archives 2020

The fall of Yahoo: The story of losing the crown of the best

There are currently more than 140 search engines in the world of the Internet. But far from using them, how many do we know? Most people know Google as a search engine, but those who have a long association with the Internet and have been using the search engine for a long time will want to keep Yahoo alongside Google. Because this search engine once ruled the world of the net.

In 2005, Yahoo was one of the most popular websites in the world. Just as we use Google Mail or Gmail today, most people used Yahoo Mail back then. Yahoo Mail also topped the list for a few days in 2011. But gradually Google seemed to snatch everything from Yahoo. Finally, in July 2016, Yahoo agreed to sell its core business to US telecommunications company Verizon for 4.46 billion. Forbes author Brian Solomon called the deal one of the saddest in the technology world.

We may all witness the fall of Yahoo, but little is known about its glorious days. Let’s find out now.

History of the beginning

Yahoo began its journey in 1994 with the help of two Stanford University electrical engineers, David Filo and Jerry Young. But in the beginning the name was not Yahoo. David and Jerry named their website “David and Jerry’s guide to the World Wide Web”. The website was renamed Yahoo in March 1994. At that time the whole internet world was scattered. So the main purpose of creating the website was to create a directory of websites like telephone directory. At the time, the website of two new graduates was one of the biggest efforts in the technology world.

Despite its lack of recognition on the World Wide Web, Yahoo quickly gained popularity in the 1990s. When Yahoo first made a public offering in 1997, it was valued at about মিল 900 million. Yahoo! Over the next two years, the company’s stock rose about 600 percent. By mid-1997, Yahoo had added a variety of services, including email, shopping, games, traveling, maps, weather, and online magazines.

Shares of Yahoo rose to বিল 40 billion that year. Yahoo started its journey at the speed of a storm. The company soon made it to the top of the technology market by providing search engines and free email services. But even then Google has not started its journey, no one could have imagined that the day of black shadow is ahead.

Yahoo’s times were like waves – sometimes up and sometimes down. In 2000, Yahoo’s total value stood at বিল 125 billion, the highest in the company’s history. Soon after, the dot com sites started gaining immense popularity by rushing and the prices also increased tremendously. This is called dot com crash or dot com bubble. The value of Yahoo is slowly declining due to the high price of these sites. In just two years, it dropped from 125 billion in 2002 to 10 billion, a shadow of past glory.

The idea of the services we receive today, such as YouTube and Facebook, was born out of Yahoo. Broadcast.com was a platform similar to YouTube, which later became known as Yahoo TV. There was also Flickr like Instagram, Yahoo Notebook like Evernote and Yahoo Music was Spotify at that time. But where did they get lost?

Mountains of wrong decisions

There may be various theories behind Yahoo’s downfall, but everyone will agree that Yahoo’s decisions were grossly flawed. Yahoo’s mistake is also responsible for Google’s position today.

In 1997, two Stanford PhD students went to Yahoo to sell their algorithms. Yahoo didn’t think it was reasonable to buy that algorithm for 1 million. Who were those two young men? Google founders Larry Page and Sergey Brin. Thanks to the pagerdank algorithm they created, today we get the desired thing as soon as we type a word in Google.

Larry and Sergei offered to sell Google to Yahoo even after Google was well established. However, the then CEO of Yahoo Terry Semel did not take it seriously. When he wanted to give his consent, the price of Google has increased to 5 billion dollars!

Around that time, a 22-year-old man who turned down Yahoo’s offer was Mark Zuckerberg. Yahoo wanted to buy Facebook for 1 billion, but Zuckerberg refused.

Not only sound education but his alertness and dedication too are most required. In 2008, Microsoft expressed interest in buying Yahoo for 44.6 billion, much higher than its current value. But then that too was rejected.

Wrong investment

In 1999, Yahoo signed two famous acquisition deals, two of the worst in the history of technology. One is Geocities, and the other is Broadcast.com.

At the time, Geocities was the third most browsed site in the Internet world. In 1999, Yahoo bought Geocity for ৭ 3.6 billion. This allowed users to create their own homepages on the Internet. Due to lack of proper management and innovation, it gradually lost its users and was discontinued in 2009.

In the same year, Yahoo bought online video streaming service Broadcast for ৭ 5.7 billion. Yahoo later launched a separate music and video service from Broadcast. The internet at that time was very slow for video streaming. Arguably, the broadcast was ahead of its time. Although Yahoo could not manage properly, the founder of the broadcast, Mark Cuban, made a name for himself.

In 2005, Yahoo bought photo-sharing site Flickr for 30 million. They tried to turn it into a social media site but failed due to poor management. The main concern was how to survive without innovation. In the same year, Yahoo bought a 40 percent stake in Alibaba. This later saved Yahoo from bankruptcy, and the current value of this percentage is about ৫০ 50 billion.

But why did so many failures surround Yahoo? Because no CEO of Yahoo was ideal. From the beginning, no one had a clear idea of ​​how the company would be run. They were not a search company, nor a tech company. Yahoo was a media company that had technology to make a profit. Employees besides the CEO are responsible for the failure. Yahoo was full of unskilled workers. As a result, they have not been able to innovate in any sector. As of 2015, Yahoo had acquired 114 companies, none of which had returned their glory.

Former Google employee Melissa Meyer was appointed CEO of Yahoo in 2012. This is the only one in the history of Yahoo that could bring the company back. But it was too late for Melissa to arrive. Melissa also failed to give proper direction to the company that lost everything, and finally Yahoo’s internet business ended in 2016 and Altaba.Inc was formed with the rest of the company.

Yahoo is a real example of a billion-dollar company that could collapse if it doesn’t keep up with the flow of technology. What Philo and Young have created is undoubtedly worthy of praise, but they have not managed Yahoo properly. Wrong decisions and mismanagement have ruined Yahoo’s existence. The wrong steps taken by Yahoo will be instructive for any technology company.

When the state harbors hackers: Nation-State hacking

In the modern technological world, all nations are competing to outdo each other. Conflicts are not limited to the confines of conventional battlefields due to geopolitical conflicts, but also the misuse of technology to intercept important information of opponents or to interfere in the internal political arena. Words like cyber attack or hacking are now heard almost all the time. But when the state emerges as the savior of hackers involved in these crimes, all the equations change, with the issue of technical security having to sit at the negotiating table anew.

Opponents can be easily identified on conventional battlefields. But the new war that has started in the modern age through cyber warfare or technology, you have to burn a lot of wood to identify your opponent, yet there is no guarantee of accuracy. And the battlefield is so large that with the click of a mouse, important information about the military secrets of a country thousands of miles away is seized or the website is disrupted. All in all, the new topic called ‘Nation State Hacking’, which is being discussed a lot, has brought to the fore such incidents as theft of information from foreign countries or hacking of websites by unscrupulous hackers using the technological advancement of the states.

ময়নসহসনস
The hacker is the figure of a man who always carries out a vicious cyber operation from behind; image source: csoonline.com

A hacker is an image of a person or a group of people hiding themselves, who keep themselves hidden from everything in the world and sit for hours in front of a computer screen, whose lives are not interrupted in any particular way. The things that are very incomprehensible to the common people about technology are pulses and rice to them. Hackers always want to stay out of the discussion, love to involve themselves in the battle of technology from behind the scenes. In the case of nation-state hacking, it is even more important to remain secretive, as diplomatic relations between the two countries are likely to end in bitterness if the adversary senses it. That’s why when the state uses hackers, the hackers get state protection.

There is a reason behind every hacking or cyber attack. Just as there must be a reason behind every action according to the causal rules of logic, there must be a reason behind every attack by hackers in the state. This could be an attempt to steal important information, to warn opponents about their own technical dominance, or to lure hackers to avenge a political event. Hacking is much more affordable than conventional warfare. In military warfare, where huge sums of money have to be spent on weapons of mass destruction, there is little cost in conducting cyber warfare (compared to conventional warfare). In addition, the issue of civilian-military casualties in conventional warfare is also very important for every state, but there is no such problem in the war of technology.

In the current case of nation-state hacking, China’s name is being pronounced quite loudly. It is thought that there are thousands of hackers under the People’s Liberation Army, the Chinese military, who are conducting numerous hacking campaigns in the national interest of China. The role of hackers in the Sino-US trade war cannot be underestimated. For years, China has struggled to seize not only important military information but also the intellectual property of American scientists and researchers. Chinese companies are developing their own innovations by harnessing the research information available to US scientists and researchers as ‘intellectual property’ through hacking. Occupying the global market, the company that is now able to bring new versions of products through constant innovation will survive. According to a US study, the United States loses about 300 billion a year due to the acquisition of intellectual property by the Chinese.

Chinese hackers and Chinese spies are playing a huge role in China’s healthcare improvement graph, which is rising every year. In fact, the technologies that are still being developed in the health sector are largely being done by Western European countries. In this case, China is working to bring European technology to its country through hacking and intelligence. Hacking is an attempt to seize intellectual property. Suppose a French scientist has designed a new model for the development of a technology used in healthcare or is on the verge of inventing a new device. In this case, the job of Chinese hackers is to somehow steal various information about the design or possible discovery from the computer of that scientist. If the stolen information or design is later handed over to the Chinese Communist Party, they will use it to improve health care. In this way, it is possible to radically change any government sector of a country through hacking.

The geopolitical situation is responsible for the activities of state hackers in Iran or North Korea. Currently, the US Trump administration is trying its best to isolate Iran through various sanctions. On the other hand, relations between North Korea and the United States are not good. Geopolitical differences with Shiite-majority Iran and other Middle Eastern countries can be openly speculated. And since the Korean War, North Korea’s relations with South Korea have been at an all-time low. Iran’s cyber-attacks are mainly carried out in Sunni countries in the Middle East. Attempts have been made to seize the military websites of these countries, unwittingly interfering with the social media accounts of military dignitaries. On the other hand, the main target of the North Korean attack is the website of the US military bases located in South Korea and South Korea. The idea is that North Korean hackers have been trained in China and Russia.

Russia, like China, does not have thousands of hackers, but those who do, should have no doubts about their skills. It is said that Russia is the most skilled hacker in the world. The Kremlin spends large sums of money on hackers, and Russia is already at the top of the world in terms of technology. Incidents such as interfering in the 2016 US presidential election show how skilled Russian hackers are. When the crisis was raging in Georgia in 2006, it was clear from the hacking campaign of Russian hackers that the Russian government was using their hackers in place.

Hackers in the United States and Israel use technologically advanced devices. It is generally believed that the United States conducts hacking in the interests of its own national security, with the aim of ensuring the security of its own government websites or important military information. North Korea, Iran, Russia or China – all target America. So America has to use hackers for its own benefit to ensure state security. However, it is not the case that America does not conduct hacking at all in foreign countries. Many of the world’s most vicious campaigns have been run by US hackers. The use of malware known as Stuxnet has caused great damage to Iran’s nuclear program, which has been done by US hackers.

Originally nation-state hacking campaigns or operations were officially classified, nothing was made public. Even then a lot goes into the media. In 2006, Israel learned that Syria was secretly pursuing a nuclear program. The Israelis launched an airstrike to destroy the nuclear plant. It is said that before the airstrikes, Israeli hackers hacked and disrupted the Syrian military’s air defense system. An Iranian hacker group hacked the official website of Saudi Arabia’s famous oil company Aramco in 2012 using a virus called Shamoon. Later, Iranian hackers deleted a lot of information from the website and hung pictures of the burning of the American flag on the website’s homepage. In 2013, the malware was found on millions of Android smartphones in Russia and Russian-speaking countries, where it is thought that Russia did so to monitor its own people.

We all know the bitter relations between India and Pakistan. Geopolitically, the two countries are eternal enemies of each other. More than once they have been involved in war. The technology battle between India and Pakistan is also going on all the time. In 2009, a Pakistani hacker group called the Pakistan Cyber ​​Army hacked the official website of the Central Bureau of Investigation (CBI), India’s highest police agency, and shut it down. In 2012, Pakistani hackers took over about 100 government websites. In retaliation, Indian hackers also launched a massive hacking campaign called ‘Operation Hangover’.

The country, run by almost all authoritarian rulers, has powerful hacker groups. In the national interest of these countries, hackers try their best to hack foreign websites or spy through malware. One of the great advantages of states in conducting cyber warfare is that they can wage war in disguise, which is also economically viable. It is often seen that where intelligence agencies fail and come back, hackers see the face of success. In the days ahead, when technology becomes completely dependent, hacker groups will become more powerful, and states will be drawn to more and more vicious hackers.