Skip to main content

Is it time to switch back to access logs for measuring site use / popularity?

What proportion of browsing is invisible?

I still use Google Analytics to see whether my blog posts are being seen, but I am curious about whether access logs would give a more accurate indication - given the prevalence of browsers and browser plugins that actively resist tracking by Javascript etc.

Back in the early 2000s the company that I was working for at the time offered website hosting as a service, where a reasonable amount of the billing was tied to the volume of traffic being served by each site. Back then we didn't have microservices scattered across multiple ephemeral virtual servers, so generating a monthly report was generally a straight-forward matter of having software configured to point at a particular directory and run a scheduled job to parse the contents of access log files.

Since I have recently come to the realisation that the Blogger platform that my blog posts are hosted and served out from is not particularly useful when it comes to being indexed by Google, it may be time to weigh up options for an alternative hosting setup.

To satisify my curiousity access to logs may be on the list of criteria for a new hosting setup. I might even switch to a lightweight static HTTP host and get back to the olden days of directly editing HTML files.

Comments

Popular posts from this blog

Speeding up Software Builds for Continuous Integration

Downloading the Internet Can you remember the last time you started out on a clean development environment and ran the build of some software using Maven or Gradle for dependency management? It takes ages to download all of the necessary third party libraries from one or more remote repositories, leading to expression like, "Just waiting for Maven to download the Internet". Once your development environment has been used for building a few projects the range of dependencies that will need to be downloaded for other builds reduces down as the previously referenced onces will now be cached and found locally on your computer's hard drive. What happens on the Continuous Integration environment? Now consider what goes on when Jenkins or your other preferred Continuous Integration server comes to build your software. If it doesn't have a local copy of the libraries that have been referenced then it is going to pay the cost of that slow " download the Internet" p...

2022 - A year in review

Just a look back over the last 12 months. January I moved back to Christchurch to live, after having spent a few months further south since moving back from London. Work was mainly around balancing other peoples' understanding and expectations around our use of Kafka. February I decided that it would be worthwhile to have a year's subscription for streaming Sky Sports, as some rugby matches that I would want to watch would be on at time when venues wouldn't be open. Having moved to Christchurch to be close to an office, now found myself working from home as Covid restrictions came back into effect across New Zealand. March Got back into some actual coding at work - as opposed to mainly reviewing pull requests for configuration changes for Kafka topics.  This became urgent, as the command line interface tool that our provisioning system was dependent on had been marked for deprecation. April   Had my first direct experience with Covid-19.  I only went for a test because ...

Designing systems - The "ity"s That Limit or Enable Profitability

Introduction This started off as a little aide-mémoire to get my head into the right space for preparing for an interview. It's not an exhaustive list, and twists terminology that has been used to represent other things (see:  to Velocity), so don't treat it as a text book reference to work from. Most of the listed points can be associated back to so called "non-functional requirements" - NFRs. I don't like that particular terminology, so alternatively we might consider them as dimensions of the quality of the sytem. Usability "If you build it, they will come" should come with a provisor, "... but if it's awkward to use they'll soon go away, and might not come back." Security All of the aspects that combine to protect data from being seen or manipulated by anyone other than the intended recipient or sender, and also assuring users that the data has originated from the intended source. Velocity Here I'm cheating a bit by trying t...