Вы находитесь на странице: 1из 3

MEASUREMENT OF TRAFFIC ON THE INTERNET, NEW CHALLENGES AND IMPLEMENTATION OF VAL

UE ADDED IN SERVICE: HR key factor. Today the success of a website is generated


primarily by its audience, ie the mass of sailors who enter its portal, is repor
ted or generate some kind of commercial transaction or otherwise. There are many
ways to generate traffic to a website, I personally am going to instruct to dev
elop three of them. How to build or help increase traffic to your website:
1 - Architecture and design of the portal or page: I consider crucial
usability of the portal concept, ie the user will achieve its objective, to achi
eve a satisfying experience when they enter your site without having to spin or
felt forced to retreat by some factor inherent to the characteristics of your si
te. In Argentina for example, the company where I work (WWW.CLICK2CHECK.COM) off
ers a complete Web usability testing to file all kinds of mistakes that could le
ad to its site to a decrease in traffic and therefore the failure. A clear examp
le of Web usability: amazon.com which offers thousands of item for sale with an
interface that is simple but not very comfortable and easy to navigate.
2 - Under the theme of the site is very convenient to provide services
value added, generating an enriching experience for visitors. Ex www.iabargentin
a.com.ar offers a series of letters of its columnists, totally free, high intell
ectual content.
3 - Finally, as another crucial factor in generating
establish traffic patterns that produce links to the navigator. For example offe
r free email service, an online calendar etc. .. Ex: Yahoo, Google, AOL.
These three factors are the key to my approach and lists examples only minimal,
as the vast amount of information on the Internet would need hundreds of pages t
o describe several cases. If your site does not meet the guidelines of usability
or other key point above, do not panic (it's only a matter of correction) to th
e biggest shows details uncorrected, for example gmail architecture in different
countries where the service is offered have certain items not unified. Turning
to the main issue is that we care about in this note, audited traffic measuremen
t gives us the information necessary to exercise stock on our site, including de
tails that gives us we can list: The number of unique visitors who enter the cou
ntry of origin, the time you enter, that activities carried out, the way they ca
me, where he went to leave your site etc ... interesting information, which must
be analyzed and related (otherwise it would not be worth anything). There are c
ompanies engaged in auditing and measuring traffic (including a partner of my co
mpany: Certifica.com) These companies are the "Internet scribes." These writers,
as I call myself, were offered through an advanced soft sufficiently detailed i
nformation to our potential investors and buyers of advertising space used to le
arn about the company online, it also aims to eliminate spurious or irrelevant i
nformation. In turn, this information allows us, for we have a site on the Inter
net, timely and specific decisions and actions effectively. Traffic data will he
lp better understand the operation of a Web site and control its management. The
following will detail the methods of measurement:
Log analysis methods (ABC Interactive, IPRO, IVC) The "log" is a file that keeps
all web server, where we annotate each and every one of the requests or require
ments to it. This means that when a user requests a URL
site, the server records the date, time, the IP of the server from which it come
s, and the files that are requested and served. The log or logfile is therefore
a complete source of information. But seen as it is, what it offers is an endles
s list of lines of code, very little understood. It is necessary to apply a filt
er, a program that "translates" those records. And so there are log analysis sof
tware. These programs are installed on a computer either. The server log file mu
st be supplied by your ISP or webmaster. If you are already in your possession,
just make it run. The reports that deliver the log analysis programs depend on p
articular program. Typically generate graphs, tables and summaries of data, orga
nizing the "magma" of the log: visitor numbers, server names, (IPs or URLs), add
resses of reference (referrers), requested files, etc. Can be considered an adva
ntage of this system, the accuracy of their data, since under the log records al
l the requirements when they reach it. Occurs€in return, the log reports only o
n the requirements, ie the pages or documents that were requested, can not say t
hey were "deployed pages", a concept known as "page view". In addition, the soft
ware used should be smart and not counted as "hits" requests for images or other
files that are parts of a page but not the page itself. A final disadvantage is
the impossibility of separating the number of unique visitors to the servers wh
ose addresses are logged. The log can only know that the request came from 200.2
8.150.4, for example, but in that direction may enter one or 100 unique visitors
.
Contador, tracker, external measurement. (Certifica.com, Webtrendslive.com, Hitb
ox.com) With the word "counter" is commonly referred to these small programs, of
which there are thousands across the network, which are installed in their own
website and access to recorded page showing:
"You are the visitor number xxxxxxx" We do not consider this system as a traffic
meter, lacking any reliable (any webmaster know manipulate the figures). But th
e name "counter" has been transferred to a type of services that include access,
in addition to providing much more information, remotely, without the intervent
ion of any site manager. Services that combine sophisticated software with power
ful databases and English are known as "trackers." How they work? Typically, the
se services have a face "Web", through which the user can register. After which
is given a particular code to be installed on the pages of your site. Each time
a surfer enters those pages, the code then sends the information captured for ea
ch request to the database. Then, and through a website, customers can access al
l the information collected: the amount of traffic, timing thereof, user behavio
r within the site, technologies used. The quantity and quality of information wi
ll depend on the service itself. By the same token, there are very basic, which
are offered free of charge, and there are others who provide large amounts of da
ta analyzed statistically. The main advantage of trackers is that they operate i
ndependently. A measurement outside the site by a third party, which acts as cer
tifier ("write"). The figures of a tracker, therefore, tend to give greater conf
idence that log analysis, as this, because they reside on the server of interest
, is modified. In addition, the data collected actually show the pages viewed, d
isplayed, because the code runs counter with the page code. Finally, the measure
ment is online, and access to data, so these services will deliver the update to
the second. The next-generation professional trackers detect unique visitor usi
ng a cookie, which is programmed to dial the browser
user, and identify it. This is the "mechanical" more effective than is known to
account for unique visitors. Audit audience Finally, these methods are reviewed
methods "accounting." Sometimes, it will be necessary to validate this data thro
ugh "auditing." In short, a more leisurely study of the information, by any audi
ting firm, to eliminate spurious or irrelevant information, and report the data
"clean" the movement of users on the site. Audits can be either on the log file
as the data collected by an online tracker, and they devote a forthcoming report
with sufficient development.
To sum up: DIFFERENTIATE is the question: SOFT + HR Obtaining relevant informati
on for the analysis of traffic to your site is becoming more accessible, in fact
there are companies that provide the necessary software with which one simply p
laces the code sent by the system in the template HTML page and then get full de
tails of the activity, classified with a high degree of detail, as well as with
other systems previously described. Then the point where they must attack the me
ters and auditing of traffic information to achieve the type of differentiated h
igh-value, and my opinion this info is not achieved by any analytical soft but w
ith human resources capable of interpreting and analyzing information generated
by the software, in a masterly manner, efficient and will ultimately be effectiv
e. HR trained to differentiate and be able to interpret the information that goe
s spinning through the network, reporting to report the information by drawing o
n real .-

Вам также может понравиться