MEASUREMENT OF TRAFFIC ON THE INTERNET, NEW CHALLENGES AND IMPLEMENTATION OF VAL UE ADDED IN SERVICE: HR key factor.

Today the success of a website is generated primarily by its audience, ie the mass of sailors who enter its portal, is repor ted or generate some kind of commercial transaction or otherwise. There are many ways to generate traffic to a website, I personally am going to instruct to dev elop three of them. How to build or help increase traffic to your website: 1 - Architecture and design of the portal or page: I consider crucial usability of the portal concept, ie the user will achieve its objective, to achi eve a satisfying experience when they enter your site without having to spin or felt forced to retreat by some factor inherent to the characteristics of your si te. In Argentina for example, the company where I work (WWW.CLICK2CHECK.COM) off ers a complete Web usability testing to file all kinds of mistakes that could le ad to its site to a decrease in traffic and therefore the failure. A clear examp le of Web usability: amazon.com which offers thousands of item for sale with an interface that is simple but not very comfortable and easy to navigate. 2 - Under the theme of the site is very convenient to provide services value added, generating an enriching experience for visitors. Ex www.iabargentin a.com.ar offers a series of letters of its columnists, totally free, high intell ectual content. 3 - Finally, as another crucial factor in generating establish traffic patterns that produce links to the navigator. For example offe r free email service, an online calendar etc. .. Ex: Yahoo, Google, AOL. These three factors are the key to my approach and lists examples only minimal, as the vast amount of information on the Internet would need hundreds of pages t o describe several cases. If your site does not meet the guidelines of usability or other key point above, do not panic (it's only a matter of correction) to th e biggest shows details uncorrected, for example gmail architecture in different countries where the service is offered have certain items not unified. Turning to the main issue is that we care about in this note, audited traffic measuremen t gives us the information necessary to exercise stock on our site, including de tails that gives us we can list: The number of unique visitors who enter the cou ntry of origin, the time you enter, that activities carried out, the way they ca me, where he went to leave your site etc ... interesting information, which must be analyzed and related (otherwise it would not be worth anything). There are c ompanies engaged in auditing and measuring traffic (including a partner of my co mpany: Certifica.com) These companies are the "Internet scribes." These writers, as I call myself, were offered through an advanced soft sufficiently detailed i nformation to our potential investors and buyers of advertising space used to le arn about the company online, it also aims to eliminate spurious or irrelevant i nformation. In turn, this information allows us, for we have a site on the Inter net, timely and specific decisions and actions effectively. Traffic data will he lp better understand the operation of a Web site and control its management. The following will detail the methods of measurement: Log analysis methods (ABC Interactive, IPRO, IVC) The "log" is a file that keeps all web server, where we annotate each and every one of the requests or require ments to it. This means that when a user requests a URL site, the server records the date, time, the IP of the server from which it come s, and the files that are requested and served. The log or logfile is therefore a complete source of information. But seen as it is, what it offers is an endles s list of lines of code, very little understood. It is necessary to apply a filt er, a program that "translates" those records. And so there are log analysis sof tware. These programs are installed on a computer either. The server log file mu st be supplied by your ISP or webmaster. If you are already in your possession, just make it run. The reports that deliver the log analysis programs depend on p

articular program. Typically generate graphs, tables and summaries of data, orga nizing the "magma" of the log: visitor numbers, server names, (IPs or URLs), add resses of reference (referrers), requested files, etc. Can be considered an adva ntage of this system, the accuracy of their data, since under the log records al l the requirements when they reach it. Occurs€in return, the log reports only o n the requirements, ie the pages or documents that were requested, can not say t hey were "deployed pages", a concept known as "page view". In addition, the soft ware used should be smart and not counted as "hits" requests for images or other files that are parts of a page but not the page itself. A final disadvantage is the impossibility of separating the number of unique visitors to the servers wh ose addresses are logged. The log can only know that the request came from 200.2 8.150.4, for example, but in that direction may enter one or 100 unique visitors . Contador, tracker, external measurement. (Certifica.com, Webtrendslive.com, Hitb ox.com) With the word "counter" is commonly referred to these small programs, of which there are thousands across the network, which are installed in their own website and access to recorded page showing: "You are the visitor number xxxxxxx" We do not consider this system as a traffic meter, lacking any reliable (any webmaster know manipulate the figures). But th e name "counter" has been transferred to a type of services that include access, in addition to providing much more information, remotely, without the intervent ion of any site manager. Services that combine sophisticated software with power ful databases and English are known as "trackers." How they work? Typically, the se services have a face "Web", through which the user can register. After which is given a particular code to be installed on the pages of your site. Each time a surfer enters those pages, the code then sends the information captured for ea ch request to the database. Then, and through a website, customers can access al l the information collected: the amount of traffic, timing thereof, user behavio r within the site, technologies used. The quantity and quality of information wi ll depend on the service itself. By the same token, there are very basic, which are offered free of charge, and there are others who provide large amounts of da ta analyzed statistically. The main advantage of trackers is that they operate i ndependently. A measurement outside the site by a third party, which acts as cer tifier ("write"). The figures of a tracker, therefore, tend to give greater conf idence that log analysis, as this, because they reside on the server of interest , is modified. In addition, the data collected actually show the pages viewed, d isplayed, because the code runs counter with the page code. Finally, the measure ment is online, and access to data, so these services will deliver the update to the second. The next-generation professional trackers detect unique visitor usi ng a cookie, which is programmed to dial the browser user, and identify it. This is the "mechanical" more effective than is known to account for unique visitors. Audit audience Finally, these methods are reviewed methods "accounting." Sometimes, it will be necessary to validate this data thro ugh "auditing." In short, a more leisurely study of the information, by any audi ting firm, to eliminate spurious or irrelevant information, and report the data "clean" the movement of users on the site. Audits can be either on the log file as the data collected by an online tracker, and they devote a forthcoming report with sufficient development. To sum up: DIFFERENTIATE is the question: SOFT + HR Obtaining relevant informati on for the analysis of traffic to your site is becoming more accessible, in fact there are companies that provide the necessary software with which one simply p laces the code sent by the system in the template HTML page and then get full de tails of the activity, classified with a high degree of detail, as well as with other systems previously described. Then the point where they must attack the me ters and auditing of traffic information to achieve the type of differentiated h igh-value, and my opinion this info is not achieved by any analytical soft but w

ith human resources capable of interpreting and analyzing information generated by the software, in a masterly manner, efficient and will ultimately be effectiv e. HR trained to differentiate and be able to interpret the information that goe s spinning through the network, reporting to report the information by drawing o n real .-