Archivo de la etiqueta: tecnología

Cómo recuperar archivos eliminados en Windows 10

Muchos hemos eliminado de manera accidental algún archivo que necesitamos o en el que estábamos trabajando o posiblemente compramos una laptop nueva y al arreglar los archivos eliminamos alguno sin querer. Sigue leyendo


Crea tu propio banner

Un banner es la herramienta más efectiva (por el momento) para insertar publicidad en medios electrónicos, en esta ocasión les quiero ofrecer una herramienta online que facilita la creación de banners. Sigue leyendo

How to Use Google Analytics to Design a Responsive Website

Responsive web design is about creating a page that responds or resizes itself according to the type of device it’s seen on. This might be anything from an oversized desk monitor to a 4 inch smartphone screen. Elements such as images that render nicely on a 17″ monitor might require scrolling on a tablet, which no one likes, or appear cut-off or distorted on a smartphone. More and more people are accessing the web from smaller personal devices. With this ongoing trend, it’s important to have a page with elements that respond differently to different devices. Otherwise, you’re likely to use a growing source of traffic.

Using Google Analytics can show these valuable data and reports about your visitors and how they interact with your page. This is vital information for successful small business website design.

How to Get Google Analytics


Screen Shot 2559-02-08 at 3.42.20 PM

All you need to do is go to and click the “sign in” link at the top right of the page to be taken to the sign up screen. Once you’ve created an account, you can sign in anytime and be taken to the Analytics page. Visit Tag Manager to find out how to get and add Google Analytics tracking code to your pages.

Custom Reports

Google is already developing reports and algorithms to help you track these smart devices. Go to Audience > Mobile > Overview to view a report showing what percentage of user sessions are coming from mobiles or tablets. Google Analytics also allows users to create custom reports for various responsive design metrics, including detailed drilldown results. This includes Device Category, Operating System Version, and Browser Version so you can see for any set of metrics what device you’re dealing with. Just click on Customization in Analytics and start building a specific report to track visitors from different sources.

Favorite Pages

Go to Site Content > All Pages to see a list of the most popular pages on your site. You might find some surprises about which pages visitors prefer to optimize your content toward different traffic sources.

Recommended for YouWebcast: Advanced Facebook Growth Hacking

Your Market Audience


Screen Shot 2559-02-08 at 4.04.19 PM

The Demographics Overview will give you an idea of who mobile visitors are. Access Age and Gender reports by clicking the links in these charts or the sidebar menu. Compare these demographics to conversion rates to find out what audience you most likely to convert, and you can adjust content and promotions to get the most out of them.

How Visitors Browse


Screen Shot 2559-02-08 at 4.10.14 PM

One nice feature of these Google reports is called In-Page Analytics. This can tell you what people are clicking on when they browse your site. Tracking and analyzing this info can help you identify what types or links or categories of information people tend to click on so you can further optimize your site for the most productive links.

All of this works to provide you insight on who is visiting your site, how they are reaching it, how they are using it, and what they like, so that you can go about improving design and content to attract more site traffic.


Keyword use is one of the fundamental ways search engines use to rank your site, and Google is telling you important information for ranking higher. In the Traffic Sources section you can find the number of visits each keyword has brought in, and add more content for the topics more people are interested in. You can improve your rank by including the best keywords in your text, links, and image tags. Of course, you’ll also get a good idea of what keywords people aren’t using.



Screen Shot 2559-02-08 at 4.22.25 PMYou want to put your time and money to the best use, and Google Analytics can help you by showing you what sites and search engines are driving your traffic under the Top Referring Sites data. You’ll be able to tell which links are working for you, which search engines are being used, and whether people are simply typing your domain into the address bar. This can help you evaluate and adjust your marketing campaign to weed out poor or non-performing sources and focus on what people are actually using. You might also find some surprises with links and recommendations you didn’t even know about, which could open whole new avenues for effective marketing.

Improving Content

Establishing which forms and categories of content people use most will help optimize your site to attract more traffic. Are they reading your blog, and on which topics? Are visitors spending more time watching videos or browsing thumbnail images from your galleries? The Top Pages report in the Content Overview portion will show the number of page views, amount of time, number of unique visitors, and more for each page. You might determine what content or features are attracting people to your top page, or top five pages, to create fresh content that draws in more visitors and keeps them coming back. A web designer can optimize your menus and links to focus traffic on your best selling points.

Bounce Rates

This is the percentage of visitors who left your site without viewing more pages. You can find this data in the Traffic reports section. Anything below 50% is normal and acceptable, but discouraged mobile users could drive it up. You want to this number down as low as possible and keep it down, however. If your bounce rates are high, say 80% or more, something about your landing pages – or exit pages – is driving people away. Analytics provides two convenient tabs for this info – labeled Landing Pages and Exit Pages. You need to take the time to examine and optimize the content on these exit pages or you’ll continue losing out on a good segment of potential customers.

Page Load


Screen Shot 2559-02-08 at 4.28.04 PM

Another tab to pay attention to is the Site Speed tab. Sort these results by average page load time to see which pages are slowest to respond to visitors. People don’t like having to wait for content to appear or links to work. Faster is always better. Review this information regularly to identify your slowest page and figure out what you can do to improve performance. Try opening these pages in different browsers or devices to see if there are compatibility issues. Consider removing features, reducing design complexity, or using smaller or fewer images to improve load time. You and your visitors will be much happier with it. Add Google Analytics for mobile apps to give you an idea of what devices are opening your pages by which means.

All of this data can seem complex and overwhelming, but there are affordable web design specialists already familiar with Analytics. By peeling back the layers and addressing one topic at a time, they’ll be able to narrow down your target audience, where they’re coming from, and what they want in order to get you the best possible results.

Lo que vendrá en tecnología para este 2016

Ya corridos en este año 2016, les dejo este artículo publicado por The Enterprisers Project con las predicciones para este año dedicado a los CIO’s…

As we approach 2016, we asked a few Enterpriser IT executives what they see on the near horizon for the future of technology. We intentionally left the question open-ended because there are plenty of other tech pubs that are already researching technology trends. Here’s what Enterprisers had to say:

Origen: 2016 technology predictions for CIOs | The Enterprisers Project

Data breach strategies and cyber risk management for the enterprise

Cyberattacks have been steadily rising. Some of the most sophisticated computer security systems in the world — from corporations, critical infrastructure and confidential government networks — have been successfully breached. According to a recent Tripwire survey conducted at Black Hat 2015, nearly two-thirds of information security professionals (64 percent) believe their organizations are potential targets for nation-state cyberattacks. In addition, 86 percent of the respondents have seen an increase in targeted attacks directed at their networks over the last year.

Additionally, successful cyberattacks can take months to discover. According toMandiant’s M-Trends 2015 report, the average time required to detect an advanced persistent threat on a corporate network is 205 days, and in the 2015 Data Breach Investigations Report, Verizon reported that 66 percent of cyberattacks took months to detect.

What should you do about all of this? Your organization could be the victim of a cyberattack at any moment, so it’s absolutely necessary to have a plan and prepare before an attack begins. Here are some steps enterprises should take now to anticipate and better prepare for the future.

  • Create and maintain a complete, accurate inventory of all hardware and software assets on your network. As part of this exercise, clearly identify which systems house sensitive business data. This is important because you must know what you have to ensure you are protecting and monitoring things appropriately, as well as identifying rogue devices that are present on your network. Many organizations do not have an accurate, up-to-date inventory of all the devices on their networks.
  • Create and maintain a plan to harvest and analyze data from critical systems on a regular basis. Make sure this plan is feasible, which generally means automating the tasks. If the process is difficult or error-prone, it won’t add value. It is important to have timely and accurate information about the state of your infrastructure.
  • Organize your network and your data to minimize what you’ll lose if you’re the victim of a breach. One of the most common issues in a data breach is that once attackers gain access to an organization’s network, they can move around to other parts of the network easily. By segregating valuable data and systems from the rest of the network, you minimize the likelihood attackers can gain access to important data from unimportant systems.
  • Know how to isolate or remove suspicious systems from the network environment. Once you’ve identified that a system has been compromised, it is important to be able to remove it from the environment and replace it with a trusted system quickly. This must be done without re-introducing a previous vulnerability – if you can’t master this, you’ll end up getting hacked in the same way over and over again.
  • Develop quarantine controls to prevent a potentially compromised system from infecting other systems. Once a system displays signs of compromise, it is important to contain it so an attacker cannot reach out and attack other systems on the network; otherwise, the attackers will be able to move freely across your network.
  • Determine your most critical data assets and look for ways to make them less valuable to an attacker if they are compromised or taken (such as through encryption or data segmentation). This way, if someone is able to move your data out of the environment, they will find that it is unusable.
  • Have the ability to change all user credentials on all production systems quickly and efficiently. This way, if you suspect a user’s account is compromised you can disable old passwords quickly and keep these accounts from being abused.
  • Understand the security risks associated with third-party partners and contractors. Although you trust many of your business partners, it’s important to verify their security practices. Suppliers who are connected to your network can be an easy path into your enterprise – for example, attackers in the Target breach were able to get in through a supplier’s network.
  • Work with your legal and PR teams to develop a comprehensive communications plan to keep key customers and stakeholders informed should a breach occur. You want trusted partners and suppliers to hear about a breach from you first – not from the media.

While the investment in these security controls and business processes may seem excessive given your resource constraints, this investment may be the key factor in minimizing the damage should a catastrophic breach occur.

One other key consideration: cyber security is not a one-size-fits-all proposition. The best security strategies start with a pragmatic assessment of risk to the business. It is important for you to agree on the risks that could cause the most harm to your business, and then align your efforts, resources, and attention with those risks.

As I always say, “The shape of your investment in security should match the shape of your risk.” That maxim holds true regardless of the size of your business or security budget.

Artículo original By Dwayne Melancon 22 Oct 2015

Tendencias Comercio electrónico 2014 en México

El comercio electrónico toma mayor importancia en México conforme pasa el tiempo, y aunque todavía falta camino por recorrer es importante conocer las tendencias del mismo y su desarrollo,  en este artículo te presento el  “Estudio Comercio Electrónico en México 2015” (¡Descargable!) desarrollado por la La Asociación Mexicana de Internet, A.C. (AMIPCI). Sigue leyendo

Star Wars: Mapa interactivo de la galaxia


Origen: Star Wars: An Interactive Galactic Experience

Como parte de la extensa campaña que se ha realizado por el lanzamiento a finales de este año de la nueva película de Star Wars, campaña que ha llenado a todos los seguidores de sorpresas como ver en acción el B-88 Sphero o un Dron del Halcón Milenario… Sigue leyendo