วันพุธที่ 22 มิถุนายน พ.ศ. 2554

Enterprise-class web analytics


Now you can analysis your website via Google Analytics tool, that it the enterprise-class web analytics solution that gives you rich insights into your website traffic and marketing effectiveness. Powerful, flexible and easy-to-use features now let you see and analyse your traffic data in an entirely new way. With Google Analytics, you're more prepared to write better-targeted ads, strengthen your marketing initiatives and create higher converting websites.

This analysis can tell: what bowser that visitor visited our website
You can plan, or redesigning your website to support the visitor bowser

This analysis can tell: Visitor came from what country in the world.
This stat that can make the web owner know, what languages that need to behave in your business website for support all visitor from around the world

This analysis can tell: how many new and return visitor to visited your website again

This analysis can tell: What languages in visitor keyboard have for
Example: thai and en 
So you can used this stat to make the online marketing plan,
You can know the main target of your website

This analysis can tell: Visitor/day
A visit happens when someone or something (robot) visits your site. It consists of one or more page views/ hits. One visitor can make multiple visits to your site.


This analysis can tell: Pages view/day
Technical definition of a pageview
A pageview is each time a visitor views a page on your website, regardless of how many hits are generated. Pages are comprised of files. Every image in a page is a separate file. When a visitor looks at a page (a pageview), they may see numerous images, graphics, pictures etc. and generate multiple hits.

This analysis can tell: Visitor Loyalty

This analysis can tell: Visitor Recency


This analysis can tell: Length of visit
In order to capture the length of a visit, Google Analytics tracks the elapsed time between pageviews. The last page of a visit will not be recorded (as there is no subsequent pageview).Single-page visits are assigned to the 0-10 second category.



This analysis can tell: Visitor OS

This analysis can tell: Visitor OS/Devices
Some visitor visited from BB, iPhone, iPad, Macbook, Other smartphone

This analysis can tell: Screen Color

This analysis can tell: Visitor Screen Solotion
The display resolution of a digital television or display device is the number of distinct pixels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by all different factors in cathode ray tube (CRT) and flat panel or projection displays using fixed picture-element (pixel) arrays.

This analysis can tell: Visitor Flash versions
Adobe Flash (formerly SmartSketch FutureSplash, FutureSplash Animator and Macromedia Flash) is a multimedia platform used to add animation, video, and interactivity to web pages. Flash is frequently used for advertisements and games. More recently, it has been positioned as a tool for "Rich Internet Applications" ("RIAs").


This analysis can tell: Visitor have JavaScript or not
Because JavaScript code can run locally in a user's browser (rather than on a remote server), the browser can respond to user actions quickly, making an application more responsive. Furthermore, JavaScript code can detect user actions which HTML alone cannot, such as individual keystrokes. Applications such as Gmail take advantage of this: much of the user-interface logic is written in JavaScript, and JavaScript dispatches requests for information (such as the content of an e-mail message) to the server. The wider trend of Ajax programming similarly exploits this strength.

This analysis can tell: Visitor ISP Provider
ISP literally means Internet service provider or provider. It is a service (most of the time paid for) which allows you to connect to the Internet.

This analysis can tell: Visitor Mobile Devices


This analysis can tell: Traffic Sources
Once a user reaches your site from one of these sources, that user's visit is tagged with a campaign tracking cookie as coming from that source. By default, subsequent visits to your site from other sources, such as from a paid search engine link, an Adwords link, or a banner ad, will override the earlier campaign cookie information. In that case, the visit will then appear in your traffic reports as coming from a different source. However, a direct traffic visit that follows a referred visit will never override an existing campaign.

This analysis can tell: Direct Traffic
On this report, you will find statistics regarding visits to your site that came by directly going to your site in the browser, be it from directly typing the URL, or from a bookmark in the user's browser. When you see the Direct Traffic report

This analysis can tell: Referring sites
That's right - a site is listed in this report if users came to your site from that site. You can click on one of the sites in your Referring Sites report to see the pages from which users came to your site. Do remember that the Referral Path will not include query parameters. 




This analysis can tell: Keyword Referring
The Entrance Keywords report shows only the keywords used to come directly to that page from a search engine. However you can get a list of all keywords that brought a visitor to that page (whether directly or through another page first) using the Dimension: Keyword pulldown on the Content Detail report.


This analysis can tell: Content Performance
Overview section gives one set of figures for Page Views and Unique Page Views.



This analysis can tell: Landing Pages
A landing page is any page on a website where traffic is sent specifically to prompt a certain action or result. Think of a golf course… a landing page is the putting green that you drive the ball (prospect) to.

This analysis can tell: Exited Pages
 an exit page is a Web page that readers leave your Web site from. Generally it is interpreted in Web analytics as a page where readers didn't find what they were looking for and so went elsewhere. It is important to evaluate exit pages to determine how you can improve your site and make it more valuable to your readers.





Google Analytics (GA) is  offered by Google that generates detailed statistics about the visitors to a website. The product is aimed at marketers as opposed to webmasters and technologists from which the industry of web analytics originally grew. It is the most widely used website statistics service, currently in use at around 57% of the 10,000 most popular websites.[2] Another market share analysis claims that Google Analytics is used at around 49.95% of the top 1,000,000 websites
GA can track visitors from all referrers, including search engines, 





วันอาทิตย์ที่ 19 มิถุนายน พ.ศ. 2554

A Full IT Outsource & Maintenance Service for Local and International Corporate

Bangkok IT-Expert Customer Services Software
a Full IT Maintenance Service for Local and International Corporate


                Bangkok IT-Expert’s have developed a full software for customer to monitor any IT equipment in your offices. Any process that our team fixed, maintenance with your IT equipment in your corporate our team will keep it in system, any movement of our team you can know.
                A main problems of any corporate even the top leader CEO, Owner of company that don’t know the basic information about IT system in your organization, This is very important thing that you should to know, it very easy to find some IT man to fixed some problem with your IT equipment, but you know what is he doing with your system or your data. Because the heart of business that run by a lot of information and data in computer and server, if one day some of your staff leaved, did you know where is he save the data, or are you sure all of your data are saved.

                This software developed by the top leader programmer team of Bangkok-ITExpert’s team from the high experience in IT maintenance services, that understand what customer want to know, and any monthly can used this software free, All of your information is secure with the world class standard software, See details below.


Customer can look up a full address and your company information

Customer can look up a number of IT equipment via graphic mode, that easy to understand


In this monitor, I selected the notebook the system will show the number and details of your all notebook

If you select to some icon, it will show the deep data of that equipment


And more than that if you need to look up the technical data you can click to “Look up hardware details”

You can look up another hardware type


You can look up via list mode

You can look up all of you IT equipment via line graph

You can look up all of you IT equipment via pie graph

You can add / remove the person that our team can contact or contact person

You can look and movement in any devices in Activity


You can set/change your account and manage your system


วันจันทร์ที่ 6 มิถุนายน พ.ศ. 2554

The hidden cost of cybercrime

The first three months of 2011 has seen a record number of new malicious software, or "malware," released on the internet. Accounting the cost of cyber attacks, however, remains difficult as the crime is underreported, analysts say.

A few years ago a disgruntled employee for a large multinational automotive firm left the company -- but when he walked out the door, he also walked out with plans for a new car model under development on a cheap USB drive.

When the plans were leaked, the cost to the company was an estimated $1 billion in lost sales and increased research and development costs, according to a security expert who worked on the case.
"The information ended up being published, which saw sales plummet for the existing model as customers decided to wait for the new model," said the expert, who asked not to be named due to confidentiality agreements with the automaker.

Yet that theft will never showed up in criminal statistics, nor will the cost be listed in public ledgers as cost due to "cybercrime." Murky by nature, cybercrime losses are difficult to categorize. That helps keep them hidden from the public eye by companies leery of publicizing breaches in corporate security.

The cost of cybercrime has come into focus due to a recent spate of high profile computer crimes: a hacker attack on Sony in May took its PlayStation Network down for 23 days after confidential information on tens of millions of network subscribers was breached; the company estimated the cost of that attack will total $171 million.

The aerospace and defense titan Lockheed Martin announced it had "a significant and tenacious attack" on May 21 using data stolen from security token maker RSA, which was hacked itself in March. Google last week announced a scam that appeared to emanate from China that stole Gmail passwords in a targeted attack of hundreds of high profile U.S. and South Korean government officials, as well as journalists and Chinese activists.


The amount of new malicious software, or "malware," unleashed on the internet during the first three months of this year hit six million programs, according to a report last week by McAfee, the computer antivirus maker. "It's been a busy start to 2011 for cybercriminals," Vincent Weafer, senior vice president of McAfee Labs, said in a statement.

A 2009 study by computer antivirus maker McAfee and SAIC, a technology security firm, estimated that computer crime cost companies $1 trillion across the globe, but analysts say the actual total is sure to be higher as computer security breaches are underreported.

"I think all the service providers are victims of this type of issue, it's just whether the company has a public interface to warn users of this type of problem is the big question," Andrew Lih, author and professor at the University of Southern California, told CNN.


"Google has been pretty good at being forthcoming in having this kind of dialogue with its users," Lih said. "It's very possible to probable that these other service providers, from Yahoo to Microsoft to any of these other ones, have had these types of attacks, it's just that Google has been very public in trying to combat this."

Sign of the Times
The increase in computer attacks is a sign of the times in a post-September 11 world of "asymmetric attacks," analysts say -- the ability for a small group of people to do disproportionate damage on governments and large companies. Just as WikiLeaks damaged U.S. foreign policy through thousands of confidential cables apparently stolen by one U.S. soldier and released to the media in November, companies are increasingly under risk by rogue attacks from employees or by outside attack.
"Especially now with the proliferation of devices," says Thomas Parenty, a former U.S. National Security Agency employee and author of "Digital Defense."

"The number of locations and devices that information can be stored makes the task of keeping track of this more difficult for an organization," Parenty says.

The increased difficulty in protecting data comes as the value of intellectual property is skyrocketing for companies. In 2009, 81% of the value of S&P 500 companies was "intangible assets" such as patented technology, proprietary data and market plans, according to an estimate by Ocean Tomo Intellectual Capital Equity. In 1985, only 68% of the S&P 500 market value was from intangibles, according to Ocean Tomo.

When bandits make off with intellectual property, the cost to the company does not equal the money made by cybercriminals.

"It's like in the Cold War -- the amount of money spies got paid to give away state secrets was absolutely inconsequential compared to the cost of the damage," Parenty says.

Reference : CNN

วันอังคารที่ 24 พฤษภาคม พ.ศ. 2554

Make Personal Email, Company Email



What your e-mail address says about you and Make Personal Email, Company Email


   If you have company and you used free email services, for example @gmail, @aol.com, @hotmail.com etc. all of that can says about your company and business
  It better and good for your business image, if you have personal company email yourname@yourdomainname.com or .co.th and you can create and manage all staff in your organization to have personal email for example.


      a@yourdomainname.com
      b@yourdomainname.com
      c@yourdomainname.com


Most of people don’t understanding how it is work



In case you don’t have personal web already
If you don’t have personal web, we can registed and made you to have personal company email within 24-48 Hrs.


In case you already have personal web but have no mail system
We can make it within 24-48 Hrs for ready to use.


In case you already have personal web but have you don’t like old email system
If you already have domain name and think the old email system, that not works well.









Old Email or simple email system 



Have a lot of spam email, and so bored because you don’t know how to protect it



Space is very less for used and limit number of account, You must check and deleted your email often, if some day you need some important email from last year you can’t, because you already removed from the system.



You must use email via Outlook all time






 New email system that we provide


Easy to used because interface like Gmail, and Can check email via web browser from anywhere in the world not only used via Outlook



A lot of space, Can check email via IPHONE, BB, Smart phone etc., that you can monitor your email from anywhere not only on computer and Easy to manage account by yourself if you are administrator or owner


Have a lot of tools for your business and easy to used


Bangkok-ITExpert Team’s itself on supplying professional IT Email System, Web Development, Business Website, network infrastructure solutions to small, medium and large organizations, working alongside the customer to ensure that day to day activities are able to continue as far as possible.

Our solutions include structured cabling, unified communications, network design and network security.  We offer services ranging from network auditing, specification and implementation, through network support and maintenance.  



www.bangkok-itexpert.com








วันศุกร์ที่ 20 พฤษภาคม พ.ศ. 2554

Create business website, (How website work and customer should to know)


                Have many business owners, need to make a best website to run business because that is the image of business.  A lot of people don’t understand how website work,

We will explain you in simple word step by step.

1.       First step Registed Domain, You must think your domain name first

Web design company provider will register your domain if it avaliable (450-1,000 THB/Domain/Year approximately in this process not include professional fee) with the world domain organization company or partner, in fact you can check available domain by yourself on “www.whois.com

“Registed Domain This process so important”  in this process if you pay for  company, you should be to keep formal billing  from provider and billing must show” registed domain services” this billing can used as evidence in legal.

Have many of our customer had this problem, some customer need to move the web services/design provider but they can’t, and the new provider cannot control nothing because cannot access to the domain name.

If you registed domain by yourself, I recommend you registed with a big company term and don’t forget to keep the formal billing from domain register provider


2.       Find Web Design Provider

Most of business website will hire the company that provides website design. To make website and provider will show you sample page before launch website to the world (This process started from 10,000-1,000,000 THB in company term) depend of system, some web is expensive because in website have a business application for example Hotel website will have reservation and payment system this system in website in technical word we call “Web Application” that made by web programmer not only web design skill.

But if your business need only simple website used only (10,000-50,000 THB with company term)


3.       Make personal Email account
xxx@yourdomainname.com , This process web design provider will manage for you  in simple system

if you have business I think you need to use your business email sure (in Technical word we say mail system) we recommend to used Google Apps (it stable more than simple mail system so much) you can check email from BB, IPhone and smart phone anywhere from the world , and this system never down and so important because you used email to contact business if it down how your business work.

4.       Launch The World
After you completed everything now, you must rent Web Server (In technical we call Hosting), this process web design provider will already made for you this process (started 600 – 10,000 THB/ Year) we recommend you to rent web server with company term, and do not think buy it because it cheap, all of your website can work or down depend of web server.

After that web design provider will upload your website to Web Server and now your website will can access around the world.

5.       How to make it to the top rank in Google or made web marketing
In fact if your website made by specialist they can made some deep technical to make your website with in top rank free.

But if you need to invest for force online marketing plan we approximate the price from our team experience

Google, 15-100 THB per click (depend of keyword)
Facebook, 20-100 THB per click (depend of country that your ads show)
Show Banner in Top 3 website in Thailand (up to 100,000-400,000 THB/Month/Banner)
Thai International News Paper website in Thailand (Up to 10,000 THB/Month/Banner Depend of size of banner)
International news website ex cnn.com, bbc.com (up to 900,000 THB /Month)

Lastly, if you need to make website the main reason to choice the web design provider or creator, is the after sale service, Do not think pay it because it cheap. You should to choice from the Professional and Specialist Team that who has responsibility and can contact those 24 hours. Not only office hours, not only business time because your business run 24 hours.





Bangkok-ITExpert Team’s itself on supplying professional IT Email System, Web Development, Business Website, network infrastructure solutions to small, medium and large organizations, working alongside the customer to ensure that day to day activities are able to continue as far as possible.

Our solutions include structured cabling, unified communications, network design and network security.  We offer services ranging from network auditing, specification and implementation, through network support and maintenance.  


Share file in organization services

   If you have the file you want to share some files to another person in the organization. What would you do?


Old System


In the past, we tend to copy down flopydisk, write down or copy to cd, handy drive or sent via email. we think you've probably heard that we can share files from one machine to another through Intranet.  This is not really any new technology at all.  But if people do not know, think it may be a complex because it is the network which requires experts to install or maintain. 

But in fact you can do in your office efficiency and increase the speed and convenience of storage. 

We can divide it into two categories



.
Shared by Data Center server



Shared by Data Center server


This method is strongly recommended for the organization. 
1. Everyone can copy all to the Server.
2. We can create Center folder for employees to move files into the server and all staff can access.

         3. We can create a folder in the server to the individual employee information.
 Each has a private
4. We can easily manage all the information we can set Authorized to view data for most.

           5. And very important is the information you will not be lost because all storage is centralized.
 If some employee have virus in his PC, all data of staff not loss because all data is in the server and easy to set new again



Machine to machine



Machine to machine
This method is not recommended for the organization because it not stable and convenient, but it good if you need to make it Temporary


1.    Setting user computer, and share folder together
2.    For example Computer “A” share folder “Document”
3.    Computer “B” Share folder Photos
4.    All of computer in network connect to Computer “A” all computer will can access the Data from computer “A” and computer “A” can access data from computer “B” too


Why it not suitable for organization, 

Case 1: Computer “A” is used in the office all day, Although Computer “A” have a very good Antivirus Program if virus attacks or whatever hardware down etc. it means all computers in network cannot access data to Computer “A”


Bangkok-ITExpert Team’s itself on supplying professional IT network infrastructure solutions to small, medium and large organizations, working alongside the customer to ensure that day to day activities are able to continue as far as possible.

Our solutions include structured cabling, unified communications, network design and network security.  We offer services ranging from network auditing, specification and implementation, through network support and maintenance.