4K Video Editing, Premiere CC & YouTube

Cooling Dilemma

The Perils of 4K Video Editing

We have uploaded hundreds of videos to YouTube so we had high hopes for 4K Video Editing. Mostly we used our GoPro Session 4 to shoot the videos and were pretty pleased with the results. The newer Session 5 was reasonably priced so we decided to take the plunge with 4K videos.

Software & Hardware

Problem & Solution
Software & Hardware

Initially we used GoPro video software and a standard Windows 10 PC for 1080p (1K) video editing but had to upgrade the PC when videos became longer.

Look for an upcoming post on upgrading PCs for video editing.

Premiere CC

GoPro Studio became problematic freezing up on long 1K  (1080p) videos so we reluctantly migrated to Premiere CC. Premiere CC is an awesome program but  very complex with a steep learning curve.

We did have issues with panning  1K videos. There was significant lag between the pan and the edit window.

PC Upgrade

Our upgraded PC was geared towards 1K video editing (1080p) but we figured we would give it a try before upgrading to faster PC that could handle 4K.

Here’s our benchmark tests from October 2017.

Research revealed that editing 4K videos in Premiere was not that much different than the 1K videos we were currently creating so we were hopeful.

GoPro Session 5

The GoPro Session 5 works as expected and does a few things better than its predecessor  including seeing video while shooting. Switching the GoPro Session to 4K mode at 30 fps was straight forward.

We now have 2 Session cameras so we can fire up our secondary camera when the battery runs down.

For those that are not familiar with GoPro  Session cameras, they are sealed units so changing the battery is not an option. The Session 5 will shoot videos while attached to a battery pack so that’s another option.

Our First Surprise

We tried editing the videos in Premiere & it didn’t seem that different from 1K editing.

Our 1st attempt to open a raw file (mp4)  from the Session 5 only in something other a video editor. We could hear audio in Windows standard software but no video. VLC would show the video but it looked awful. Our problem was that our monitor didn’t support 4K so we upgraded once again. Truthfully, it was well past time for a new monitor.

We set up dual monitors using our old 1080p monitor as our secondary monitor. Interestingly it now will open 4K videos now that is tied to a primary video. It doesn’t look nearly as clear as our 4K monitor but it suffices for mundane tasks like email & web browsing.

Premiere CC 4K & Proxies

Editing 4K videos didn’t seem to be much worse than 1K but we figured we would make it as easy possible for our hardware with proxies. With proxies, we are effectively editing at 1K and publishing at 4K.

Proxies require an additional encoding step so it makes our work flow a bit slower but editing is much easier.

It still doesn’t fix our original problem with panning 1K video but that’s to be expected.

YouTube & Our Second Surprise

We were anxious to see our 4K videos on YouTube and checked as soon as processing was done. The available quality was a mere 360 p so we feared something was amiss in our Premiere setup so started reviewing the mp4s we were uploading. Everything seemed in order and a little research showed that 4K could take a bit longer to show up as YouTube has to generate videos for every resolution.

Eventually our videos did show up as 4K  but you still need a 4K monitor to see them.



4K worth the extra trouble?

Our main goal with 4K was to have extra resolution, hoping zoom and panning would be clearer. The jury is still out on that since we haven’t processed enough videos to make a definitive decision.

We still have our Session 4 so we could shoot the same scenes with 1K & 4K for a one to one comparison.  However the Session 5 only shoots 30 fps (frames per second) at 4K while the Session 4 shoots 60 fps at 1K so maybe it’s not a foregone conclusion that Session 5 video will be better. I could always slow down the Session 4 to 30 fps but our goal was to have better videos than the Session  4 provided.

Perhaps the fps only applies to changing the motion of the video. If

Movies Word On Stage Shows Cinema And Hollywood

that’s the case, we won’t see many changes since we rarely adjust video speed.

Without a doubt the files are much larger so we have to make accommodations in cloud storage.

The proxy files are also large but we don’t store those permanently since they can be regenerated. We did the same with huge GoPro Studio AVIs.

Speedup My Computer – Remove Malware


SpeedUp My Computer is a common request.

Typically we look for malware slowing down a computer but there are other issues  that can have a big impact on performance.


SpeedUp My Computer by Cleaning Files

cCleaner is a useful tool to speed up your computer even if malware is not present. It optimizes your computer and removes unnecessary files and registry entries.

It’s sometimes useful to run this before your anti-virus scan since it will remove lots of temporary files which won’t have to be scanned.

Faster Computer

Is your computer running slow? As it gets older it collects unused files and settings which take up hard drive space making it slower and slower. CCleaner cleans up these files and makes it faster instantly.

SpeedUp My Computer by Upgrading Hardware

Overworked hardware can also be an issue where an older computer

SpeedUp My Computer With CPU Replacement
SpeedUp My Computer With CPU Replacement

got upgraded to the latest Operating System. In this scenario, you should consider upgrading memory, hard drive and or processor (CPU) depending on cost and the


In this scenario, you should consider upgrading memory, hard drive and or CPU depending on cost and the resource you need.

In general, a memory upgrade is useful. If you have very little space moving files to an external drive and/DVDs might be the answer.

If you are trying to get the last bit of speed out of your old computer consider a new CPU.

SpeedUp My Computer by Removing Malware

Usually, I can scan a client’s computer with a remote connection like TeamViewer.

Virus warning on laptop
Virus warning on laptop

On occasion, that’s not possible so the client has to bring the computer in or I have to go to the client’s site. Site visits are the most expensive for the client since they typically incur travel charges and higher hourly fees.

 Virus Scan

Either way, we generally start out with a MalwareBytes scan. This can be problematic if the computer cannot access the web.

Local Computer Scan Without Access to the Web

If we come to the client then we have the software on removable media or have the means to download same.

We bring the anti-virus software to the disabled computer and kick off a scan.

Remote Computer Scan Without Access to the Web

In the case of a remote computer, we need the client to copy the software on removable media and insert into the slow one or need access to another computer on their network.

The former solution requires some technological skills and removable media. The latter assumes that some shares are accessible via their network.

Assuming we get the anti-virus software installed on the slow computer, we can begin our scan.

Computer Scan Results

Depending on what the anti-virus program finds we will schedule other scans like AdwCleaner, Avast Browser Cleanup, Junkware Removal, and Hitman Pro.

Occasionally, AdwCleaner may flag legitimate software so be careful what you allow it to remove. You can restore quarantined software as long as AdwCleaner is not removed so it’s best to leave it on the computer.

I like to Google the malware found and find put which anti-virus scans are required. A typical sequence for us is to use the following.

  1. Malware Bytes
  2. AdwCleaner
  3. HitMan Pro

Bleeping Computer is my favorite site for finding anti-virus solutions and downloads.

SpeedUp My Computer by Stopping Windows Search Service

Any number of programs want to use Windows search including Windows Explorer, Cortana and Outlook so you should be prepared to see prompts from these programs when you turn off Windows Search.

You can usually find services by clicking Start and typing “Services” in

the search bar. Click on the Services program.

Scroll down until you find Windows Search and stop the service. Switch the Startup type to disabled.

Synchronize Your Cloud Files Without Slowing Down Your Computer

Cloud Computing

Synchronize Your Cloud Files

Clouds are a great storage option to protect your files. Even if your computer dies the files still live on in the cloud.

Issues With Clouds – Synchronize Your Cloud Files

The problem is that Synchronizing Your Cloud Files may slow your computer down to a crawl if you are synchronizing too many files. We certainly don’t want that.

Synchronize Your Cloud Files Without Slowing Down Your Computer
Problem & Solution

Another problem with Synchronize Your Cloud Files is that it’s somewhat limited unless you purchase a premium plan.

Limited Space in the Cloud

When we use clouds with limited space we have to ensure we don’t try to back up unnecessary files.

The best Synchronize Your Cloud Files solution is to back up files that are the most important taking precautions with sensitive materials by encrypting.

Scroll down or click for help with Synchronizing Select Cloud Files

We can also spread out files among various cloud plans by maybe putting family photos on one and business documents on another.

If you have Office 365 you get 1 TB to backup your files so space should not be a major concern.

Slow Computer

The more files you have to synchronize the longer it takes the cloud software to index your files and upload.

Even if you only change one file the software has to evaluate them all. This can make your computer unusable when the cloud software is indexing.

Slow Zone
Slow Zone

Synchronizing websites can be particularly bad since they may have lots of little files.

If there are repository file like Git then the situation is even worse.

If Windows Search all by itself can slow down your computer. Add that to cloud synchronization and you may think your computer is broken or infected.

Synchronize Your Cloud Files – Too Many Files

One Solution that addresses speed and space is to limit the files you synchronize.

If you have plenty of space but don’t want to drag your computer down every time it indexes your changes you can select which folders you need synchronized.

In our case, we have lots of websites and customer backups that don’t need to be constantly synchronized.

First we backup these sorts of files to an external drive or internal section of our drive that’s not associated with the cloud.

Test Case

We download a lot of stock photos from GraphicStock.com that we may want to use someday and we have 1 TB of cloud storage available on OneDrive thanks to our Office 365 subscription.

Initially we download the stock photos to our external RAID (12 TB) into a folder that shows it has not been synchronized to the cloud.

Problem Folder
Problem Folder

Then we copy this folder to an appropriate place on our local OneDrive folder which gets synchronized to the cloud.

OneDrive Problem Folder
OneDrive Problem Folder

Once the synchronization is complete we remove the folder from synchronization by opening OneDrive Settings.


  • Start OneDrive if it’s not running
  • Right click OneDrive icon in tray
  • Navigate to Account Tab
  • Choose folders
    • Only Choose folders that are likely to change

      OneDrive Settings - Account
      OneDrive Settings – Account
What This Does

Removing the folder from synchronization removes the files from the local PC which is why we have it backed up outside the OneDrive folder. We don’t need these files in 2 places on our computer.

More importantly OneDrive doesn’t have to scan through all these files to see if they have changed. Since they are stock photos we won’t be changing them.

We might however create new versions from the stock photos but we will be sure to back these up.

It does not remove the files from the cloud so the files are still available on OneDrive.com

Windows Search

Windows Search is also known for slowing down your computer so this added to a cloud backup can really bring your computer to a crawl.

This is especially true if you try to open Windows Explorer. Just clicking on a drive may take a long time to open. Think minutes instead of seconds.

Disabling Windows Search

Microsoft constantly recommends Windows Search for Outlook and Windows Explorer. They suggest that searches may take a long time unless we turn it on.

Search performance will be impacted because Windows Search service is turned off.

In our experience, Windows Search slows down any drive with a lot of files. You probably want to turn it off even if you are not synchronizing Cloud files.

Perhaps Windows Search is useful if you are looking for text within files but it’s a significant drag on our resources.

Disabling Windows Search is easy enough. Crank up the Services and disable Windows Search.

Windows Services
Windows Services

You can find Services by typing in the search bar. Double click Windows Search service and set it to disabled or manual.start



It’s possible to synchronize your files to the clouds without impacting your computer performance by selecting specific files and folders to keep synchronized.

Turning off Windows Search will help even if you are not synchronizing files to the cloud.

Keep Your Data Safe With Secure Email


Are you using secure email?

This post is focused on secure email but some aspects like SSL and encryption apply equally to data in general.

  • With all the breaches in the headlines, it behooves us to secure our email.
  • Breaches expose client data that can be used to access your accounts.
  • Even if a hacker has your email account credentials, he may be unable to read encrypted email.
  • Email can be accessed by the unscrupulous in a number of ways.
  • Sending email without SSL is like sending your mail on postcards.

Think your data is safe?

Our focus is finding solutions that work for our clients with minimal intervention and/or setup.

Recent Breaches?


These high profile breaches are a reminder that our data is not as secure as we would like.

Anything shared on the Internet is vulnerable to various types of snooping and hacks.

Email is no exception.

With the information gleaned from breaches, hackers may have direct access to your accounts if they uncovered passwords that you use elsewhere.

That’s why we suggest unique strong passwords  for every account.

Let’s investigate methods to secure our email.

How Difficult is it for Someone to Hack Your Data?

With folks getting emails on their mobile devices via Wi-Fi, it’s more important than ever to use secure email.cartoon-hacker-with-laptop-400

The best defense is to use encryption but that is not as convenient as we would like.

SSL email helps in most cases.

Otherwise your email is open to anyone that can sniff it out of the air.

That’s easier than you may think using attacks like Man in the Middle.

Hacking Methods Used

Once hackers have your information there are a number of ways to access your accounts.

With enough information, a determined hacker can gain access to your accounts.phishing-and-spy

  • Phishing – acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
  • Man-in-the-middle attack (MITM) – attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  • Session stealing (cookie hijacking) – exploitation of a valid computer session (session key) to gain unauthorized access to information or services in a computer system. … theft of a magic cookie used to authenticate a user to a remote server.
  • Keylogging (Keystroke logging/keyboard capturing) –  recording (logging) the keys struck on a keyboard, typically covertly.
  • Social Engineering – psychological manipulation of people into performing actions or divulging confidential information
  • Hacking your computer – malware planted on your computer allows hackers complete access to your data
    • If a hacker has access to your computer you need to have it cleaned.

Doesn’t  SSL Secure My Email?

Using SSL for your email provides security between you and your email host.

Prior to SSL (Secure Socket Layer) emails were sent in plain text from your email client like Outlook to the host server.

Google’s chart below shows that most email to and from Gmail in the America’s uses SSL.

email-Gmail Secure Email
Volume of email to and from Gmail

SSL is helpful but it doesn’t keep anyone with access to the server from reading your email or necessarily guarantee that it will be transported to the recipient via SSL.

Client-side SSL is a step in the right direction but encrypting you email is much more secure.

Using SSL and SSL Email Setup?

If you want to check whether you are using SSL you can use Comcast’s guide to interrogate various email clients.

If you need to setup an email account to use SSL you can contact your provider or Google setup “Provider Name” email.

“Provider Name” is the provider who sends you a bill each month.

Implementing Secure Email

Secure Email
Secure Email

We encrypted email for our clients back in the late 1980s but it was tedious to setup and use.

Consequently, secure email was not considered a priority and seldom used.

We need encryption to ensure that sensitive email is not compromised.

This requires some inconvenience on the clients but it’s the best way to secure our email.

HIPAA Compliant Email

With the advent of the HIPAA (Health Insurance Portability and Accountability Act) companies have become more security aware.

If you send sensitive email or work in the medical industry you may be required to secure your email or face penalties.

The Health Insurance Portability and Accountability Act (HIPAA), sets the standard for protecting sensitive patient data. Any organization dealing with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed.

Paubox article on HIPAA compliance

sending receiving email
sending receiving email

Is HIPAA Email Encrypted?

Some HIPAA email providers like GoDaddy do not necessarily encrypt email in transit.

There is some debate on whether or not HIPAA requires email to be encrypted.

GoDaddy encryption has an add-on for HIPAA email. It’s an all or nothing scenario so all your mailboxes either get encryption or they don’t.

Likewise encrypted email isn’t necessarily HIPAA compliant.

HIPAA compliance requires partners to sign a Business Associate Agreement (BAA).

HIPAA Compliant Hosts

GoDaddy and other hosts offer HIPAA compliant email.


GoDaddy was the least expensive of the providers we found using Exchange email.


HIPAA requires health care providers to ensure that their business associates will safeguard Protected Health Information (PHI). If you are interested in emailing with your patients, or sending any patient data through email, you need to be sure that your email is protected in a HIPAA-compliant manner.



Some vendors offer HIPAA compliant email with Exchange like features.

In some ways, these email services may surpass Exchange by encrypting email.

On the other hand, why not get a service that is like Exchange when you can have Exchange even if it isn’t encrypted.


You need encryption if you want to secure your email while in transit.

Encryption Key
Encryption Key

HIPAA email providers using Exchange email do not necessarily encrypt in transit.

There are, however,  encryption add-ons.

Encryption uses PGP key pairs.

One key is shared with the public and the other is private.

Without the private key, your message is safe from prying eyes.

Generating Keys

Part of the challenge of setting up and using PGP encryption is the generation and tracking keys.

Security Key
Security Key

The nomenclature is a bit confusing.

Key generators typically import private keys and export public keys.

Some key generators will export both public and private keys simultaneously.


GPG4Win’s Kleopatra Interface is a bit clunky but works fine once set up.


We did have issues with some public certificates generated in Kleopatra not working with Gravity Form PGP Extension.

Interestingly the Kleopatra generated  public key did not work with Kleopatra but did work with Gmail Mailvelope extension.

Importing the  Kleopatra public key into Mailvelope and exporting produced a working certificate for our server.


Mailvelope Chrome extension easy to install and use.


After running into issues with Kleopatra generated public certificates, we tried generating keys via Mailvelope.

Unfortunately, the certificates didn’t install well on Gravity Form PGP Extension.

Gravity Form PGP Extension requires a matching email address for a notification email and the Mailvelope public certificates displayed none.

Symantec Desktop Email Encryption

Symantec Desktop Email Encryption was the easiest solution to work with but expensive.

It works with Macs & Windows but not Linux.

Once setup outlook emails are decrypted automatically with no intervention of the user.

Secure Email

ProtonMail and Gmail send encrypted email these days but you lose that

Secure Email
Secure Email

feature when you send to an outside account.

Gmail is not HIPAA compliant.

Google Apps business email is HIPAA compliant.

Web Forms

If your website asks for sensitive information you should use SSL and encryption to protect that data.

Installation instructions for Gravity Forms PGP Encryption plugin
Installation instructions for Gravity Forms PGP Encryption plugin

Gravity Forms and their PGP Extension  makes it easy to setup an encrypted form.

Gravity Form PGP Extension requires public keys and matching email for notifications to be send.


When you send encrypted email you must decrypt to read it.

The following table lists software that handles encryption/decryption.

Recommended Software


Gpg4win is a free solution for Windows Outlook users.

  1. Import private key
  2. Certify you will be able to
  3. Decrypt messages
    1. Open message
    2. click decrypt


Mailvelope is a free and easy solution to implement for Gmail and Chrome.

This is the easiest solution if you are using Gmail and Chrome.

  1. Install extension
  2. Import private key
  3. Emails are automatically decrypted


  • Use SSL Email at very least.
  • Make sure your computer doesn’t have malware.
  • Encrypt email if you and your correspondents want the most security.
  • Use HIPAA email if you deal with Protected Health Information (PHI).

Ways Your Mother Lied to You About Website Templates

Web Design

Website templates offer a quick and relatively inexpensive path to a modern website without breaking the bank.

Were You Lied to?

No doubt your mother didn’t want you to know the tuth about website templates if she ran her own design business.

Am I alone in this?

Perhaps you were protected for your own good.

The Truth

The truth is that website templates can be great foundation for a fresh website or a new look on an existion website.

Our Policy

Downs Consulting typically starts our customers with website templates that the customer chooses to get a quick preview of their new website.

We suggest website templates that don’t need a lot of customization if you are on a budget.

For some, it’s difficult to imagine their text and images on the template not to mention how it will look on a phone or tablet.

If you are just starting out you may want to review website requirements.

It’s best to think about SEO before picking your domain, building your website or even picking your business name.

You may also want to create business social media accounts if you haven’t already done so.

Website Templates

With website templates it doesn’t take long to see an actual site.

Note the site under construction will be out of the view of the general public.

There are a number of sites like

website templates
Website Templates

Template Monster that supply inexpensive templates for various types of websites.

If you don’t find a perfect match , look for a responsive template that would look good with your text and images.

Consider your template to be the foundation of your website.

As the saying goes, “There’s no point in re-inventing the wheel”.

Will My Website Be Original?

Website templates may be used in various websites so they may look


similar to some.

The key to having an original look is having unique images, text and pages.

If you choose to keep the stock images that came with the template then your site will look similar to all those other websites that did little customization.

If you are short on images you can use stock photos from sites like Graphic Stock.

It’s best,however, to use your photos.

It’s easy enough to snap photos from your phone.

Can I Buy a Custom Template?

Some sites will sell you the rights to a template and take it “off the shelf”.

Custom Template
Custom Template

Unless the template has never been sold before then there may already be websites using the template or they could show up in the future.

Downs Consulting suggests customizing your template so that it’s not that similar.

How Custom Can a Template Become?

You can easily give  a template a custom look by replacing the images and text.

You can further customize a website by adding your own forms, carts, background images, logos.

You can change the website color scheme.

Note that completely customizing a template can become expensive.

How Is My Development Site Hidden?

Web developers have a number of ways to hide a site from the public.

  • Host the website on developer’s site
  • Use Folder of Current Website
  • Use Subdomain
    • Example: demo.website.com

Some content management system (CMS) websites like WordPress are difficult to move between hosts so they will likely be installed on your hosting plan.

Hopefully the host has a simple way to move CMS websites once they are ready for production.

Is My Development Site Live?

If you can see your development website on another computer that doesn’t have the website source then your website is live.


Live simply means the website is available via the Internet.

The trick to hiding the website is that there are no links to it anywhere.

Ultimately you will see your development progress to production status (e.g.,  www.example.com)


Your developer should include a robots.txt file that keeps the search engines from indexing the production site.

This keeps the development site from looking like a duplicate.

User-agent: *
Disallow: /

It is vital to update the robots.txt file once the site is moved to its home.

Otherwise Google won’t index your site!

Could Someone Else Find My Development Site?

It’s very unlikely that anyone will stumble across your development website.

If this is a concern your web developer can add a password to the website but this could slow down development and review.

Some folks may confuse it with a real language but it’s purpose is to show text effects.

Just imagine the headlines as your “call to action” text.

If this is too much of a stretch your web developer can put up a sample website so that only you can see it.

Isn’t a Custom Website Better?

A custom website has the potential to be very different from any templates


notwithstanding some basic building blocks like the code required to make it responsive (e.g., Bootstrap).

This will make you standout from the rest of the crowd however it can be rather expensive to build a completely unique website.

Can Someone Copy My Website?

If you build a unique website or purchase an unused template there is little to prevent someone from copying your HTML design once it’s live.

Code on the server like php for WordPress sites is hidden so this could not be copied directly.

What About SEO?

Having a website is wonderful but getting found on the web can be difficult in today’s competitive landscape.



SEO is the key to your website being found.

Start with developing a keywords that would bring customers to your website.

To rank for any keyword your website should have a compelling reason for users to visit you rather than your competitors.

Once we have your keywords we can do on-page optimization to make your website competitive.

Local SEO

Local SEO gives local businesses a better chance of competing in a local area.

Local SEO
Local SEO

The foundation for Local SEO is citations where your NAP (business Name, Address, Phone) are consistent across many sites with little or no duplication.

There are sites that will sell premium listings that are updated easily but we recommend claiming your listings manually or via a service.

Does My Domain Name Matter?

Your domain name can be very beneficial if it matches or contains some of your keywords.


If you are starting out then choosing a domain that matches your keywords is a smart move for SEO.

On the other hand, established websites should probably continue with the existing domain.

Starting Your Business?

If you are just starting your business consider using keywords in the business name.

An established business probably doesn’t want to change their name for a SEO but you could still use a “Doing Business As” Name (DBA).

Why Do I Care About Social Media Accounts?

Social Media accounts allow you to interact with your customers and

Social Media Like
Social Media Like

provide useful information to them.

It may not be obvious why you would want to provide free information but the idea is to establish your expertise in these areas.

If  your social media friends trust your expertise then they may want to consult with you when it comes time to use your services or products.