วันพุธที่ 22 มิถุนายน พ.ศ. 2554

Enterprise-class web analytics


Now you can analysis your website via Google Analytics tool, that it the enterprise-class web analytics solution that gives you rich insights into your website traffic and marketing effectiveness. Powerful, flexible and easy-to-use features now let you see and analyse your traffic data in an entirely new way. With Google Analytics, you're more prepared to write better-targeted ads, strengthen your marketing initiatives and create higher converting websites.

This analysis can tell: what bowser that visitor visited our website
You can plan, or redesigning your website to support the visitor bowser

This analysis can tell: Visitor came from what country in the world.
This stat that can make the web owner know, what languages that need to behave in your business website for support all visitor from around the world

This analysis can tell: how many new and return visitor to visited your website again

This analysis can tell: What languages in visitor keyboard have for
Example: thai and en 
So you can used this stat to make the online marketing plan,
You can know the main target of your website

This analysis can tell: Visitor/day
A visit happens when someone or something (robot) visits your site. It consists of one or more page views/ hits. One visitor can make multiple visits to your site.


This analysis can tell: Pages view/day
Technical definition of a pageview
A pageview is each time a visitor views a page on your website, regardless of how many hits are generated. Pages are comprised of files. Every image in a page is a separate file. When a visitor looks at a page (a pageview), they may see numerous images, graphics, pictures etc. and generate multiple hits.

This analysis can tell: Visitor Loyalty

This analysis can tell: Visitor Recency


This analysis can tell: Length of visit
In order to capture the length of a visit, Google Analytics tracks the elapsed time between pageviews. The last page of a visit will not be recorded (as there is no subsequent pageview).Single-page visits are assigned to the 0-10 second category.



This analysis can tell: Visitor OS

This analysis can tell: Visitor OS/Devices
Some visitor visited from BB, iPhone, iPad, Macbook, Other smartphone

This analysis can tell: Screen Color

This analysis can tell: Visitor Screen Solotion
The display resolution of a digital television or display device is the number of distinct pixels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by all different factors in cathode ray tube (CRT) and flat panel or projection displays using fixed picture-element (pixel) arrays.

This analysis can tell: Visitor Flash versions
Adobe Flash (formerly SmartSketch FutureSplash, FutureSplash Animator and Macromedia Flash) is a multimedia platform used to add animation, video, and interactivity to web pages. Flash is frequently used for advertisements and games. More recently, it has been positioned as a tool for "Rich Internet Applications" ("RIAs").


This analysis can tell: Visitor have JavaScript or not
Because JavaScript code can run locally in a user's browser (rather than on a remote server), the browser can respond to user actions quickly, making an application more responsive. Furthermore, JavaScript code can detect user actions which HTML alone cannot, such as individual keystrokes. Applications such as Gmail take advantage of this: much of the user-interface logic is written in JavaScript, and JavaScript dispatches requests for information (such as the content of an e-mail message) to the server. The wider trend of Ajax programming similarly exploits this strength.

This analysis can tell: Visitor ISP Provider
ISP literally means Internet service provider or provider. It is a service (most of the time paid for) which allows you to connect to the Internet.

This analysis can tell: Visitor Mobile Devices


This analysis can tell: Traffic Sources
Once a user reaches your site from one of these sources, that user's visit is tagged with a campaign tracking cookie as coming from that source. By default, subsequent visits to your site from other sources, such as from a paid search engine link, an Adwords link, or a banner ad, will override the earlier campaign cookie information. In that case, the visit will then appear in your traffic reports as coming from a different source. However, a direct traffic visit that follows a referred visit will never override an existing campaign.

This analysis can tell: Direct Traffic
On this report, you will find statistics regarding visits to your site that came by directly going to your site in the browser, be it from directly typing the URL, or from a bookmark in the user's browser. When you see the Direct Traffic report

This analysis can tell: Referring sites
That's right - a site is listed in this report if users came to your site from that site. You can click on one of the sites in your Referring Sites report to see the pages from which users came to your site. Do remember that the Referral Path will not include query parameters. 




This analysis can tell: Keyword Referring
The Entrance Keywords report shows only the keywords used to come directly to that page from a search engine. However you can get a list of all keywords that brought a visitor to that page (whether directly or through another page first) using the Dimension: Keyword pulldown on the Content Detail report.


This analysis can tell: Content Performance
Overview section gives one set of figures for Page Views and Unique Page Views.



This analysis can tell: Landing Pages
A landing page is any page on a website where traffic is sent specifically to prompt a certain action or result. Think of a golf course… a landing page is the putting green that you drive the ball (prospect) to.

This analysis can tell: Exited Pages
 an exit page is a Web page that readers leave your Web site from. Generally it is interpreted in Web analytics as a page where readers didn't find what they were looking for and so went elsewhere. It is important to evaluate exit pages to determine how you can improve your site and make it more valuable to your readers.





Google Analytics (GA) is  offered by Google that generates detailed statistics about the visitors to a website. The product is aimed at marketers as opposed to webmasters and technologists from which the industry of web analytics originally grew. It is the most widely used website statistics service, currently in use at around 57% of the 10,000 most popular websites.[2] Another market share analysis claims that Google Analytics is used at around 49.95% of the top 1,000,000 websites
GA can track visitors from all referrers, including search engines, 





วันอาทิตย์ที่ 19 มิถุนายน พ.ศ. 2554

A Full IT Outsource & Maintenance Service for Local and International Corporate

Bangkok IT-Expert Customer Services Software
a Full IT Maintenance Service for Local and International Corporate


                Bangkok IT-Expert’s have developed a full software for customer to monitor any IT equipment in your offices. Any process that our team fixed, maintenance with your IT equipment in your corporate our team will keep it in system, any movement of our team you can know.
                A main problems of any corporate even the top leader CEO, Owner of company that don’t know the basic information about IT system in your organization, This is very important thing that you should to know, it very easy to find some IT man to fixed some problem with your IT equipment, but you know what is he doing with your system or your data. Because the heart of business that run by a lot of information and data in computer and server, if one day some of your staff leaved, did you know where is he save the data, or are you sure all of your data are saved.

                This software developed by the top leader programmer team of Bangkok-ITExpert’s team from the high experience in IT maintenance services, that understand what customer want to know, and any monthly can used this software free, All of your information is secure with the world class standard software, See details below.


Customer can look up a full address and your company information

Customer can look up a number of IT equipment via graphic mode, that easy to understand


In this monitor, I selected the notebook the system will show the number and details of your all notebook

If you select to some icon, it will show the deep data of that equipment


And more than that if you need to look up the technical data you can click to “Look up hardware details”

You can look up another hardware type


You can look up via list mode

You can look up all of you IT equipment via line graph

You can look up all of you IT equipment via pie graph

You can add / remove the person that our team can contact or contact person

You can look and movement in any devices in Activity


You can set/change your account and manage your system


วันจันทร์ที่ 6 มิถุนายน พ.ศ. 2554

The hidden cost of cybercrime

The first three months of 2011 has seen a record number of new malicious software, or "malware," released on the internet. Accounting the cost of cyber attacks, however, remains difficult as the crime is underreported, analysts say.

A few years ago a disgruntled employee for a large multinational automotive firm left the company -- but when he walked out the door, he also walked out with plans for a new car model under development on a cheap USB drive.

When the plans were leaked, the cost to the company was an estimated $1 billion in lost sales and increased research and development costs, according to a security expert who worked on the case.
"The information ended up being published, which saw sales plummet for the existing model as customers decided to wait for the new model," said the expert, who asked not to be named due to confidentiality agreements with the automaker.

Yet that theft will never showed up in criminal statistics, nor will the cost be listed in public ledgers as cost due to "cybercrime." Murky by nature, cybercrime losses are difficult to categorize. That helps keep them hidden from the public eye by companies leery of publicizing breaches in corporate security.

The cost of cybercrime has come into focus due to a recent spate of high profile computer crimes: a hacker attack on Sony in May took its PlayStation Network down for 23 days after confidential information on tens of millions of network subscribers was breached; the company estimated the cost of that attack will total $171 million.

The aerospace and defense titan Lockheed Martin announced it had "a significant and tenacious attack" on May 21 using data stolen from security token maker RSA, which was hacked itself in March. Google last week announced a scam that appeared to emanate from China that stole Gmail passwords in a targeted attack of hundreds of high profile U.S. and South Korean government officials, as well as journalists and Chinese activists.


The amount of new malicious software, or "malware," unleashed on the internet during the first three months of this year hit six million programs, according to a report last week by McAfee, the computer antivirus maker. "It's been a busy start to 2011 for cybercriminals," Vincent Weafer, senior vice president of McAfee Labs, said in a statement.

A 2009 study by computer antivirus maker McAfee and SAIC, a technology security firm, estimated that computer crime cost companies $1 trillion across the globe, but analysts say the actual total is sure to be higher as computer security breaches are underreported.

"I think all the service providers are victims of this type of issue, it's just whether the company has a public interface to warn users of this type of problem is the big question," Andrew Lih, author and professor at the University of Southern California, told CNN.


"Google has been pretty good at being forthcoming in having this kind of dialogue with its users," Lih said. "It's very possible to probable that these other service providers, from Yahoo to Microsoft to any of these other ones, have had these types of attacks, it's just that Google has been very public in trying to combat this."

Sign of the Times
The increase in computer attacks is a sign of the times in a post-September 11 world of "asymmetric attacks," analysts say -- the ability for a small group of people to do disproportionate damage on governments and large companies. Just as WikiLeaks damaged U.S. foreign policy through thousands of confidential cables apparently stolen by one U.S. soldier and released to the media in November, companies are increasingly under risk by rogue attacks from employees or by outside attack.
"Especially now with the proliferation of devices," says Thomas Parenty, a former U.S. National Security Agency employee and author of "Digital Defense."

"The number of locations and devices that information can be stored makes the task of keeping track of this more difficult for an organization," Parenty says.

The increased difficulty in protecting data comes as the value of intellectual property is skyrocketing for companies. In 2009, 81% of the value of S&P 500 companies was "intangible assets" such as patented technology, proprietary data and market plans, according to an estimate by Ocean Tomo Intellectual Capital Equity. In 1985, only 68% of the S&P 500 market value was from intangibles, according to Ocean Tomo.

When bandits make off with intellectual property, the cost to the company does not equal the money made by cybercriminals.

"It's like in the Cold War -- the amount of money spies got paid to give away state secrets was absolutely inconsequential compared to the cost of the damage," Parenty says.

Reference : CNN