Fathom

fathomgit

Please feel free to contact us

Go
img

About

Fathom is a privacy-focused web analytics platform crafted to deliver crucial insights into visitor behaviour while maintaining the highest standards of user privacy and data protection. Unlike traditional analytics tools that may use intrusive tracking methods, Fathom provides a streamlined and respectful approach to understanding web traffic.

Key Features

  1. Privacy-Centric Analytics
    • Anonymous Tracking: Collect and analyse visitor data without infringing on privacy. Fathom does not use cookies or track personal information, ensuring complete user anonymity.
    • Compliance: Adheres to major privacy regulations such as GDPR and CCPA, ensuring your analytics practices are fully compliant.
  2. User-Friendly Dashboard
    • Intuitive Interface: Navigate a sleek, modern dashboard designed for ease of use, offering quick access to key metrics and insights.
    • Customizable Reports: Tailor analytics reports to highlight the metrics that matter most to your business.
  3. Real-Time Analytics
    • Immediate Insights: Access up-to-the-minute data on visitor behaviour, including page views, traffic sources, and user interactions.
    • Simplified Metrics: View essential metrics without the clutter, enabling faster and more informed decision-making.
  4. Performance Tracking
    • Visitor Insights: Monitor how visitors engage with your site, including time spent on pages and bounce rates, all while respecting their privacy.
    • Conversion Tracking: Track key performance indicators (KPIs) and conversion rates to assess the effectiveness of your marketing strategies.
  5. Easy Integration
    • Seamless Setup: Integrate Fathom with your website effortlessly using straightforward tracking codes.
    • CMS and Platform Support: Compatible with major content management systems (CMS) and web platforms for a smooth implementation.
  6. Data Security
    • End-to-End Encryption: Protect all collected and transmitted data with encryption to prevent unauthorized access.
    • Data Retention: Retain data only for a limited period, focusing on valuable insights without unnecessary data accumulation.
  7. Minimal Impact on Performance
    • Lightweight Code: The tracking code is optimized to have minimal impact on your website’s performance, ensuring fast load times and a smooth user experience.
  8. Customizable Alerts
    • Performance Alerts: Set up alerts to notify you of significant changes in traffic patterns or key metrics, allowing for swift responses to emerging trends.
  9. Global Reach
    • Multi-Language Support: Access the platform in various languages to cater to a global user base and ensure clear analytics reporting.

You can subscribe to Fathom, an AWS Marketplace product and launch an instance from the product’s AMI using the Amazon EC2 launch wizard.

To launch an instance from the AWS Marketplace using the launch wizard

  • Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
  • From the Amazon EC2 dashboard, choose Launch Instance. On the Choose an Amazon Machine Image (AMI) page, choose the AWS Marketplace category on the left. Find a suitable AMI by browsing the categories, or using the search functionality. Choose Select to choose your product.
  • A dialog displays an overview of the product you’ve selected. You can view the pricing information, as well as any other information that the vendor has provided. When you’re ready, choose Continue.
  • On the Choose an Instance Type page, select the hardware configuration and size of the instance to launch. When you’re done, choose Next: Configure Instance Details.
  • On the next pages of the wizard, you can configure your instance, add storage, and add tags. For more information about the different options you can configure, see Launching an Instance. Choose Next until you reach the Configure Security Group page.
  • The wizard creates a new security group according to the vendor’s specifications for the product. The security group may include rules that allow all IP addresses (0.0.0.0/0) access on SSH (port 22) on Linux or RDP (port 3389) on Windows. We recommend that you adjust these rules to allow only a specific address or range of addresses to access your instance over those ports
  • When you are ready, choose Review and Launch.
  • On the Review Instance Launch page, check the details of the AMI from which you’re about to launch the instance, as well as the other configuration details you set up in the wizard. When you’re ready, choose Launch to select or create a key pair, and launch your instance.
  • Depending on the product you’ve subscribed to, the instance may take a few minutes or more to launch. You are first subscribed to the product before your instance can launch. If there are any problems with your credit card details, you will be asked to update your account details. When the launch confirmation page displays.

Usage/Deployment Instructions

Step 1: SSH into Your Instance: Open Putty software and use the SSH command with the username ubuntu and the appropriate key-pair to start the application.

Username:  ubuntu

ssh -i path/to/ssh_key.pem ubuntu@instance-IP

Replace path/to/ssh_key.pem with the path to your SSH key file and instance-IP with the public IP address of your instance.


Step 2: Check whether Fathom is successfully installed using the command:

fathom -v


Step 3: Access Fathom Web Interface: Open the Fathom Web UI: In your web browser navigate to the URL:http://your-server-ip.

On the Fathom login page, enter your admin username and password, then click Sign In.


Step 4: Set Up Your Site: After logging in, enter your site name and click Create Site. You can update your site name as needed.


Step 4: Update the Site Name (Optional STEP)


Step 5: Congratulations, You have successfully accessed the Fathom dashboard. Happy journey!!!

All your queries are important to us. Please feel free to connect.

24X7 support provided for all the customers.

We are happy to help you.

Submit your Queryhttps://miritech.com/contact-us/

Contact Numbers:

Contact E-mail:

Submit Your Request





    Input this code: captcha

    Amazon EC2 allows you to set up and configure everything about your instances from your operating system up to your applications. An Amazon Machine Image (AMI) is simply a packaged-up environment that includes all the necessary bits to set up and boot your instance. Your AMIs are your unit of deployment. You might have just one AMI or you might compose your system out of several building block AMIs (e.g., webservers, appservers, and databases). Amazon EC2 provides a number of tools to make creating an AMI easy. Once you create a custom AMI, you will need to bundle it. If you are bundling an image with a root device backed by Amazon EBS, you can simply use the bundle command in the AWS Management Console. If you are bundling an image with a boot partition on the instance store, then you will need to use the AMI Tools to upload it to Amazon S3. Amazon EC2 uses Amazon EBS and Amazon S3 to provide reliable, scalable storage of your AMIs so that we can boot them when you ask us to do so.

    Or, if you want, you don’t have to set up your own AMI from scratch. You can choose from a number of globally available AMIs that provide useful instances. For example, if you just want a simple Linux server, you can choose one of the standard Linux distribution AMIs.

    Traditional hosting services generally provide a pre-configured resource for a fixed amount of time and at a predetermined cost. Amazon EC2 differs fundamentally in the flexibility, control and significant cost savings it offers developers, allowing them to treat Amazon EC2 as their own personal data center with the benefit of Amazon.com’s robust infrastructure.

    When computing requirements unexpectedly change (up or down), Amazon EC2 can instantly respond, meaning that developers have the ability to control how many resources are in use at any given point in time. In contrast, traditional hosting services generally provide a fixed number of resources for a fixed amount of time, meaning that users have a limited ability to easily respond when their usage is rapidly changing, unpredictable, or is known to experience large peaks at various intervals.

    Secondly, many hosting services don’t provide full control over the compute resources being provided. Using Amazon EC2, developers can choose not only to initiate or shut down instances at any time, they can completely customize the configuration of their instances to suit their needs – and change it at any time. Most hosting services cater more towards groups of users with similar system requirements, and so offer limited ability to change these.

    Finally, with Amazon EC2 developers enjoy the benefit of paying only for their actual resource consumption – and at very low rates. Most hosting services require users to pay a fixed, up-front fee irrespective of their actual computing power used, and so users risk overbuying resources to compensate for the inability to quickly scale up resources within a short time frame.

    No. You do not need an Elastic IP address for all your instances. By default, every instance comes with a private IP address and an internet routable public IP address. The private address is associated exclusively with the instance and is only returned to Amazon EC2 when the instance is stopped or terminated. The public address is associated exclusively with the instance until it is stopped, terminated or replaced with an Elastic IP address. These IP addresses should be adequate for many applications where you do not need a long lived internet routable end point. Compute clusters, web crawling, and backend services are all examples of applications that typically do not require Elastic IP addresses.

    You have complete control over the visibility of your systems. The Amazon EC2 security systems allow you to place your running instances into arbitrary groups of your choice. Using the web services interface, you can then specify which groups may communicate with which other groups, and also which IP subnets on the Internet may talk to which groups. This allows you to control access to your instances in our highly dynamic environment. Of course, you should also secure your instance as you would any other server.

    Highlights

    • icon

      Privacy-Centric Design

    • icon

      User-Friendly Dashboard

    • icon

      Real-Time Data

    • icon

      Performance Tracking

    • icon

      Easy Integration

    • icon

      Data Security

    Application Installed

    • icon Fathom
    • icon git