Web Analytics and Site Optimizatiion

Web Analytics

Subscribe to Web Analytics: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Web Analytics: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

I am often humbled by the depth of insight of those who toil in the trenches of the enterprise data center. At our Agility conference back in August, my cohort and I gave a presentation on the State of Application Delivery. One of the interesting tidbits of data we offered was that, over the course of the past year, our iHealth data shows a steady and nearly even split of HTTP and HTTPS traffic. To give you an example, my data from October was derived from over 3 million (3, 087, 211 to be precise) virtual servers. Of those, roughly 32% were configured to support HTTP, and another 30% were supporting HTTPS. Now, I’ve been looking at this data for more than a year, and it has stayed roughly the same with only slight variations up or down, but always within a couple percentage points of each other. But it wasn’t until a particularly astute customer spoke up that I un... (more)

Web Application Lifecycle Maintenance

Like an automobile, a web application needs occasional maintenance and management over its life cycle. Although it doesn't need oil changes, it will probably need version upgrades. There may not be manufacturer recalls, but sometimes servers fail or hang. An application doesn't need to be washed and detailed, but it does need to be backed up. And both cars and applications need occasional performance tuning. This article provides a complete list of the system management functions that need to be performed on a standard architecture web application, with a particular emphasis on doing so in an Infrastructure-as-a-Service environment. 1. Evaluation Anyone who has implemented an application without sufficient evaluation, only to realize too late that it does not solve the business problem, will understand why evaluation is part of the application lifecycle. Evaluatio... (more)

Big Data Is Not Just About Marketing: Don’t Forget the IT Department’s Needs

Few, if any, information technology subjects have garnered more attention over the past two years than Big Data. It's a savior. It's evil. It's the killer app of killer apps. And now, according to Gartner analyst Svetlana Sicular, "Big Data Is Falling into the Trough of Disillusionment." This disillusionment is giving me a little bit of Big Data fatigue - at least in the sense that so much buzz is focused on what Big Data can do for marketing and business intelligence departments. Lost amid all the hype and hoopla is the story of how predictive analytics can help IT teams better understand and support the business applications that are the very lifeblood of their enterprise. After all, predicting the right service to offer your online customer won't help if the customer experiences sluggish application performance. And Big Data is not going away. Big Data begets Ve... (more)

The Catch 22 Between Revenue, Content, and Performance By @ElGrecoSF | @DevOpsSummit #APM #DevOps

The Catch 22 Between Revenue, Content, and Performance By Peter Kacandes A recent Wall Street Journal article discussed the challenges that online content publishers have in monetizing their content as more and more user traffic shifts to mobile devices from traditional desktop/laptop computers/browsers. Data from Mary Meeker’s 2015 Internet trends report in particular shows that the time adult users in the US spend online per day on mobile is up 51%. And the article cites similar data showing that the time spent on mobile properties of certain publishers jumped 40% in the last 12 months to 52% of the time spent viewing their content. The problem, though, is that revenue from mobile advertising is not rising nearly quickly enough to offset the decreases from the desktop. There are several reasons for that, including the limited screen size of mobile, which limits t... (more)

2015 Big Data Startups By @JimKaskade | @BigDataExpo #BigData

The following are a few  Big Data companies that I was keeping an eye on starting back in January of 2015  (yeah, this is NOT a statistically significant sample)....some for "old times sake" because I knew the founding team and was curious how things were progressing, some because I trust their venture capital partners, and some because they inspire me with an application of the technology that is meaningful (I'm tired of hearing about yet another "Big Data Platform"). Adatao Founder(s): Christopher Nguyen, Mike Bui, Tony Do Headquarters: Sunnyvale, CA Website: www.adatao.com Type of business: Data Intelligence for All Adatao is Big Data 2.0, enabling the convergence of business intelligence, data science and machine learning directly on top of big data. Adatao is leading the Big Data 2.0 charge by making it easy for business users, data scientists and engineers to co... (more)

Google OS - A Cynical View

If you didn’t hear that Google has announced that in 2010 consumers will have a chance to enjoy new Chrome-based OS, stop reading and do you homework first. Done? Now we can move on, and let’s do it by the rules – positive things first, then some bile followed by a happy end. I really like Google. They produce easy to use applications that work great. I use their search engine about a hundred times a day. Their applications make sense. Nine months ago they released a Web browser called Chrome, and I liked it. Back than I suggested that in a year Chrome will bite off a decent chunk of the Web browser's market. (see  http://yakovfain.javadevelopersjournal.com/i_like_google_chrome.htm). I was wrong. They’ve bitten a really small piece of the browser’s pie. For lots of companies 3% of any market would be like money from home, but for Google it’s a failure. Now they sa... (more)

Externalizing Fine-Grained Authorization from Applications

The recent spike in insider threats, coupled with a rise in compliance considerations, has forced organizations to ensure only authorized users access sensitive application functionality and data. Historically, user entitlements or authorization logic has been embedded inside an application. For example, if the user of an application meets specific conditions, such as a specific role, access to that application function will be granted at runtime. But if the definition of specific authorization conditions changes over time, then the application developer needs to modify the application's source code, test, and re-deploy the application. Suppose a homegrown portal application must present a sensitive piece of customer information such as a Social Security Number (SSN) when a service representative views a customer's profile. It is determined that in order to ensure ... (more)

JavaScript: The Definitive Guide

This book has delivered exactly what I was hoping for, an in-depth look into modern day JavaScript. I rarely use JavaScript nowadays in my day to day job. I have been lucky to avoid the messy browser applications it is usually a part of the past few years. That was my primary reason for buying the book. Although I may not like it, JavaScript is here to stay, and I need to keep current with it. The book is broken into 4 parts. Core JavaScript, Client-Side JavaScript, Core JavaScript Reference, and Client-Side JavaScript Reference. The book has chapters on Lexical Structure, Expressions and Operators, Statements, Objects, Arrays, Functions, Classes and Modules, Pattern Matching with Regular Expressions, JavaScript Subsets and Extensions, Server-Side JavaScript, JavaScript in Web Browsers, The Window Object, Scripting Documents, Scripting CSS, Handling Events, Scripted HTT... (more)

Common Web Application Security Vulnerabilities and Mitigation

Web applications are vulnerable to a multitude of security attacks. This exposes the underlying businesses and the consumer data to public view. However it is a common observation that web developers hardly take any preventive steps to secure their web applications. Most of the time web application developers focus only on authentication and authorization to secure the web applications. This may be a viable approach for designing an intranet application. However, for the Internet application, multiple programming practices need to be followed to prevent such attacks. This article details in brief the various security vulnerabilities web applications face and how they can be mitigated. Bypassing Input Validation Generally developers validate the user input using JavaScript validations. Once the information is sent to the server side, developers do not validate again,... (more)

The Book of CSS3: A Developer's Guide to the Future of Web Design

It's quite clear from reading this book that Peter Gasston is very knowledgeable about CSS 3 and, as he points out in the preface, this book is a culmination of five years of work that he has spent writing about CSS3. There is a clear order to the chapters. The earlier chapters are well implemented and the items discussed there are used on a regular basis. The final chapters are more speculative in nature. The author takes a very methodical approach in the book. He covers numerous topics in a clear and well-thought-out manner. He provides several examples for each topic that is covered. There are 17 chapters and an appendix. After each topic is introduced, the author informs you as to which of the major browsers implements the feature. The last chapter discusses the future of CSS3. The appendix collects all of the browser support tables that are found in each chap... (more)

Applying Big Data and Big Analytics to Customer Engagement

Customer engagement has long benefited from data and analytics. Knowing more about each of your customers, their attributes, preferences, behaviors and patterns, is essential to fostering meaningful engagement with them. As technologies advance, and more of people's lives are lived online, more and more data about customers is captured and made available. At face value, this is good; more data means better analytics, which means better understanding of customers and therefore more meaningful engagement. However, volumes of data measured in terabytes, petabytes, and beyond are so big they have spawned the terms "Big Data" and "Big Analytics." At this scale, there are practical considerations that must be understood to successfully reap the benefits for customer engagement. This article will explore some of these considerations and provide some suggestions on how to a... (more)