SlideShare a Scribd company logo
1 of 26
Download to read offline
he est raining f
          oogle nalytics 
Google Analytics 部落格實作流量追蹤


Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
申請Google Analytics帳戶
1.  使用 Gmail 帳號

2.  啟用 Google Analytics 服務
  –  http://www.google.com/analytics/




                                          Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
部落格實作流量追蹤
一. 內容管理系統

二. 樣版模組化的一致化平台

三. 利用現成知名的部落格平台

四. 學習與熟悉流量追蹤知識的入門




                  Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
建立GA帳號
1.  準備好您的部落格網址
 –  http://webgasample.pixnet.net/blog

 –  http://webgasample.blogspot.tw/

 –  http://blog.xuite.net/webgasample/blog

 –  http://www.wretch.cc/blog/webgasample

2.  建立帳戶取得追蹤碼




                                             Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
一、網頁內容模組支援
1.  提供小工具插入功能
  (Widget, Gadget, …)

2.  已具備需所的 Javascript
  程式碼安裝功能

3.  準備流量追蹤資源代碼
  (Web Property ID)



                        Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
二、平台支援流量追蹤
1.  提供簡潔快速的設定

2.  提供穩定運作的技術支援

3.  準備流量追蹤資源代碼
 (Web Property ID)




                     Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
三、利用適當方法支援
1.  取得流量追蹤帳戶與追蹤代
  碼(GATC)
2.  程式碼要安裝正確 **                                   h=p://xuite.net
3.  部落格系統可能會過濾可被
  接受的程式碼。
 –    不出現於網頁之中 (filtering)

4.  部落格系統可能會阻止程式
                                          h=p://www.wretch.cc
  碼執行。
 –    避開程式碼 (escape)

                             Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.
Massiveans


            脈析數位顧問
   為您打造數位營銷的紮實基礎 創造網路無限可能商機

         h=p://www.MassiveAns.com




                           Copyright	
  ©	
  2012	
  MassiveAns	
  Consul8ng	
  Inc.	
  All	
  rights	
  reserved.

More Related Content

Similar to Google Analytics blog support

The Future of Enterprise IT - Lessons Learned
The Future of Enterprise IT - Lessons LearnedThe Future of Enterprise IT - Lessons Learned
The Future of Enterprise IT - Lessons LearnedAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Amazon Web Services
 
20200522 - How to migrate an existing app to serverless
20200522 - How to migrate an existing app to serverless20200522 - How to migrate an existing app to serverless
20200522 - How to migrate an existing app to serverlessMarcia Villalba
 
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Amazon Web Services
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...Amazon Web Services
 
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...Amazon Web Services
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...Amazon Web Services
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Boaz Ziniman
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Amazon Web Services
 
Starting your Cloud Journey - AWSomeDay Israel
Starting your Cloud Journey - AWSomeDay IsraelStarting your Cloud Journey - AWSomeDay Israel
Starting your Cloud Journey - AWSomeDay IsraelAmazon Web Services
 
Starting your cloud journey - AWSomeDay Israel
Starting your cloud journey - AWSomeDay IsraelStarting your cloud journey - AWSomeDay Israel
Starting your cloud journey - AWSomeDay IsraelBoaz Ziniman
 
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...Fastly
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018Amazon Web Services
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Amazon Web Services
 
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018Amazon Web Services
 

Similar to Google Analytics blog support (20)

Containers for Startups
Containers for StartupsContainers for Startups
Containers for Startups
 
Keynote: AWS Startup Day São Paulo
Keynote: AWS Startup Day São PauloKeynote: AWS Startup Day São Paulo
Keynote: AWS Startup Day São Paulo
 
The Future of Enterprise IT - Lessons Learned
The Future of Enterprise IT - Lessons LearnedThe Future of Enterprise IT - Lessons Learned
The Future of Enterprise IT - Lessons Learned
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
 
20200522 - How to migrate an existing app to serverless
20200522 - How to migrate an existing app to serverless20200522 - How to migrate an existing app to serverless
20200522 - How to migrate an existing app to serverless
 
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
 
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large-Scale Migrations - AWS Transformation...
 
KeynoteKosut_SFStartupDay
KeynoteKosut_SFStartupDayKeynoteKosut_SFStartupDay
KeynoteKosut_SFStartupDay
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
 
Starting your Cloud Journey - AWSomeDay Israel
Starting your Cloud Journey - AWSomeDay IsraelStarting your Cloud Journey - AWSomeDay Israel
Starting your Cloud Journey - AWSomeDay Israel
 
Starting your cloud journey - AWSomeDay Israel
Starting your cloud journey - AWSomeDay IsraelStarting your cloud journey - AWSomeDay Israel
Starting your cloud journey - AWSomeDay Israel
 
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...
Altitude San Francisco 2018: How Magento moved to the cloud while maintaining...
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018
Monitoring Serverless Applications (SRV303-S) - AWS re:Invent 2018
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018
Best Practices for Large Scale Migrations - AWS Transformation Day Boston 2018
 

Google Analytics blog support