Considerations about Google Tag Manager
Make (almost)everything you want with GTM onto your client's website
In informatic science always we get involved onto customers that get afraid of that software we call “virus”, “malware”, “spyware” and “trojan horse”: in these days we can get in touch with a new Google Technology that Google called Tag Manager but that in the reality is nothing less than backdoor.
A backdoor is just a software that allow that attacker get a wonderful position and opening a door inside the PC of the victim trying to elude the protection based on password or encrypted methods, so:
- A Malware is a backdoor
- A Spyware is a backdoor
- A Virus may be a backdoor
- A Trojan horse may be a backdoor
- Google Tag manager is a backdoor
So...Using tag manager let you avoid the latency of agencies's works
From 1971 hackers all around the world try to tell that is not always a bad thing calling hackers and it is not always a bad thing to use backdoors or trojan just because the only thing that really matters is how in fact we use it
In facts, before Google tag manager:
- you setup an objective in Google Analytics
- create a code for sending an event to setup conversion on it
- send the code to the web agency of your client writing an email with technical data about where they must paste the code
- wait for response.
- Controls if they setup the code correctly onto your predicted position: if they fail...REDO
With google tag manager we just have to ask the web agency to setup two piece of code and the other work depends just on us.
Google Tag Manager is a backdoorin sense that you may generate some code that you thousands of 'alert()' every opening the page, but you really can using it just to collect anonymous informations about what users of the websites, do during the session:
You can setup Hotjar in seconds and know how many people collapse to your contact page and fill the form, using the google tag manager form event.