구글 애널리틱스

회사에서 구글 애널리특시 GA 교육을 진행해 줬는데 페이지 내 코드만 삽입하는 거로는 단순 PV나 이런 거 밖에 확인 못하고 보다 더 구체적인 목표를 세워서 GA 설계를 전문적으로 컨설팅해주는 전문가도 있다고 들었다. GTM 태그를 통해 보다 더 reuse 한 코드로 만들어야해서 개발자들도 한번씩 들어보면 좋을 듯... 12년 축적된 구글 애널리틱스 실전 노하우, 하루 만에 전수 http://goo.gl/BLXNwI 구글 애널리틱스에 정답은 없습니다. 그러나 수많은 기업이 시행착오를 거쳐 터득한 모범답안은 있습니다. 외부에 잘 알려주지 않는 각 기업의 구글 애널리틱스 Best Practice 비법 전수. 구글 애널리틱스 실무교육 1위 마소캠퍼스라서 가능합니다.

구글 애널리틱스

회사에서 구글 애널리특시 GA 교육을 진행해 줬는데 페이지 내 코드만 삽입하는 거로는 단순 PV나 이런 거 밖에 확인 못하고 보다 더 구체적인 목표를 세워서 GA 설계를 전문적으로 컨설팅해주는 전문가도 있다고 들었다. GTM 태그를 통해 보다 더 reuse 한 코드로 만들어야해서 개발자들도 한번씩 들어보면 좋을 듯... 12년 축적된 구글 애널리틱스 실전 노하우, 하루 만에 전수 http://goo.gl/BLXNwI 구글 애널리틱스에 정답은 없습니다. 그러나 수많은 기업이 시행착오를 거쳐 터득한 모범답안은 있습니다. 외부에 잘 알려주지 않는 각 기업의 구글 애널리틱스 Best Practice 비법 전수. 구글 애널리틱스 실무교육 1위 마소캠퍼스라서 가능합니다.
블로그 다시 시작해 볼깐..

[sum] open-sources

A Resistance is tactics and means to oppose the strategies of “The Prince”. examples of “electronic disturbance”are virus, trojan horse, worm, bomb and back door. A software virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. A Trojan horse virus designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! A worm virus that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. A bomb virus is a code surrept...

[sum] public & privacy

In this week, we talk about public & privacy. Surveillance is the monitoring of behavior. Although surveillance can be a useful tool for law enforcement and security companies, many people have concerns about the loss of privacy. They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety. Today some artists and art groups concerned with surveillance. Data Surveillance (Dataveillance) is the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance or capture model is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time captured activity in comparison with surveillance is assembled from standardized “parts” fr...

[sum] human

In this week, we talk about "human". Haraway likens "cyborg" to the political identity of "women of color," which "marks out a self-consciously constructed space that cannot affirm the capacity to act on the basis of natural identification, but only on the basis of conscious coalition, of affinity, of political kinship" (ibid). The "Cyborg" though, is grounded in "political-scientific" analysis. This analysis takes up most of the manifesto. Haraway uses the metaphor of the cyborg to discuss the relationships of science, technology, and "socialist-feminism." She holds that hi-tech culture challenges and breaks down the old dualisms of Western thinking like the mind/body split, Self/Other, male/female, reality/appearance, and truth/illusion. She holds that we are no longer able to think of ourselves in these terms, or even strictly speaking, as biological entities. Instead, we have become cyborgs, mixtures of human and...