SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Mark Gibbs [email_address] http://gibbs.com Messaging: From the  Sublime to the Ridiculous Twitter
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],$1,000,000,000
The  Twitter Zone
What is Twitter? A “tweet”: Maximum 140  characters including spaces On the Web or  through an app A “microblogging” Web  site and Web service
Twitter & Everyone Public Timeline 300 to 600 tweets per second! That’s about 14,191,200,000 per year.
You & Everyone
 
Types of Tweets This is a tweet that will be seen in the public timeline and by my followers D fred  This is a private tweet that will only be seen by “fred” This is a tweet with hashtags that will be seen  in the  #public #timeline  and by my followers @fred  This is a tweet that will seen by “fred” even if he isn’t following  me and will be seen in the public timeline and by my followers This is a tweet with a URL –  http://gibbsuniversal.com/sentimeter This is a tweet with a shortened URL –  http://bit.ly/44iVMz RT @fred  This is a re-tweet that will that will seen by “fred” even if he isn’t  following me, in the public timeline, and by my followers This is a tweet that will that will seen in the public timeline, and by  my followers that asks for a re-tweet;  Pls RT
Successful Tweets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5 Billion Served ,[object Object],[object Object],[object Object],http://news.cnet.com/8301-13577_3-10378353-36.html?part=rss&subj=news&tag=2547-1_3-0-20
Twitter Growth ,[object Object],[object Object],http:// siteanalytics.compete.com/twitter.com /
http://ebiquity.umbc.edu/blogger/2007/04/19/twitter-social-network-analysis/
@quistuipater
 
 
http://tweetstats.com/
My Tweets http://tweetstats.com/
 
Client Software I Use http://tweetstats.com/
My Followers
Followers I Don’t Need
What Do We Tweet About? The WYAFL  Syndrome
http://www.informationisbeautiful.net/2009/more-truth-about-twitter/
What’s the Business Value?
Twitter for Enterprises ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Reliable is Twitter?
 
http://www.pingdom.com/reports/vb1395a6sww3/check_overview/?name=twitter.com%2Fhome
http://www.pingdom.com/reports/vb1395a6sww3/check_overview/?name=twitter.com%2Fhome
Google search --  site:twitter.com/*username
 
 
Success ,[object Object],[object Object],[object Object],[object Object]
$3,000,000 Earned from Twitter (since 2007)
 
 
 
 
 
http://www.cnn.com/2009/HEALTH/10/09/cheating.death.suspended.animation/index.html?iref= topnews
 
Twitter for SMBs ,[object Object],[object Object],[object Object],[object Object]
Kogi Korean BBQ Taco Truck http://kogibbq.com/ 300 to 800 people each time it parks  http://www.latimes.com/features/printedition/food/la-fo-kogi11-2009feb11,0,3007869.story
 
 
 
Making Twitter Your %@#$&
Twitter Clients http://www.seesmic.com/ http://www.tweetdeck.com/
Twitter API http://apiwiki.twitter.com/
Web Applications
Hashtag Tracker http://gibbs.com/motm/
Xcelsius
 
RSS Feed –  automatically  checked every six hours Twitter API CTC Blog Twitterfeed Twitter
 
Analyzing Sentiment http://www.openamplify.com/ ,[object Object],[object Object]
Search Twitter for a term  Submit search result  to OpenAmplify  Graph Results  Extract sentiment “signals”
Client side: Sentimeter Custom Server-based Proxy Twitter Search  OpenAmplify
http://gibbs.com/guii/sentimeter.html
http://gibbs.com/guii/sentimeter.html
Next Steps ,[object Object],[object Object],[object Object],[object Object],[object Object]
Should You Care About Twitter? ,[object Object],[object Object],[object Object],[object Object],[object Object]
If you ignore Twitter or any other social media you will be missing out on a strategic business opportunity. One your competitors will not miss … Yes, you absolutely  should care!
Thank-you.

Weitere ähnliche Inhalte

Was ist angesagt?

Tweeting for the Masses
Tweeting for the MassesTweeting for the Masses
Tweeting for the Masseswschamp9
 
1545 omma social ian schafer
1545 omma social ian schafer1545 omma social ian schafer
1545 omma social ian schaferMediaPost
 
Minnesota Multihousing Twitter Presentation
Minnesota Multihousing Twitter PresentationMinnesota Multihousing Twitter Presentation
Minnesota Multihousing Twitter PresentationRobert Turnbull
 
Many Uses Of Friendfeed
Many Uses Of FriendfeedMany Uses Of Friendfeed
Many Uses Of FriendfeedLaura Norvig
 
Day2 wordpress-rss
Day2 wordpress-rssDay2 wordpress-rss
Day2 wordpress-rssjjohnson95
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Mohammad Hijazi
 
Sucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri
 
Using twitter at conferences
Using twitter at conferencesUsing twitter at conferences
Using twitter at conferencesNell Eckersley
 
How to create back links
How to create back linksHow to create back links
How to create back linksmohamedashif10
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?Sucuri
 
about twitter (basic, history and marketing)
about twitter (basic, history and marketing)about twitter (basic, history and marketing)
about twitter (basic, history and marketing)Pranish Balami
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State UniversityJason Austin
 
Eight years of top business brands on twitter and their first tweets
Eight years of top business brands on twitter and their first tweetsEight years of top business brands on twitter and their first tweets
Eight years of top business brands on twitter and their first tweetsEarnest
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 

Was ist angesagt? (18)

Tweeting for the Masses
Tweeting for the MassesTweeting for the Masses
Tweeting for the Masses
 
1545 omma social ian schafer
1545 omma social ian schafer1545 omma social ian schafer
1545 omma social ian schafer
 
Minnesota Multihousing Twitter Presentation
Minnesota Multihousing Twitter PresentationMinnesota Multihousing Twitter Presentation
Minnesota Multihousing Twitter Presentation
 
Many Uses Of Friendfeed
Many Uses Of FriendfeedMany Uses Of Friendfeed
Many Uses Of Friendfeed
 
Day2 wordpress-rss
Day2 wordpress-rssDay2 wordpress-rss
Day2 wordpress-rss
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)
 
Sucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight It
 
Twitter: A Final Friday presentation
Twitter: A Final Friday presentationTwitter: A Final Friday presentation
Twitter: A Final Friday presentation
 
Using twitter at conferences
Using twitter at conferencesUsing twitter at conferences
Using twitter at conferences
 
How to create back links
How to create back linksHow to create back links
How to create back links
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
about twitter (basic, history and marketing)
about twitter (basic, history and marketing)about twitter (basic, history and marketing)
about twitter (basic, history and marketing)
 
Ways to write Social Media Updates?
Ways to write Social Media Updates?Ways to write Social Media Updates?
Ways to write Social Media Updates?
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State University
 
Eight years of top business brands on twitter and their first tweets
Eight years of top business brands on twitter and their first tweetsEight years of top business brands on twitter and their first tweets
Eight years of top business brands on twitter and their first tweets
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter_CLMS_2009
Twitter_CLMS_2009Twitter_CLMS_2009
Twitter_CLMS_2009
 
Twitter For Writers
Twitter For WritersTwitter For Writers
Twitter For Writers
 

Andere mochten auch

Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis ManagementMark Gibbs
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media DreamCorinne Weisgerber
 
Everything you ever wanted to know about social media but were afarid to ask.
Everything you ever wanted to know about social media but were afarid to ask.Everything you ever wanted to know about social media but were afarid to ask.
Everything you ever wanted to know about social media but were afarid to ask.Mark Gibbs
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiJoachim Ritter
 
Let the community do more than just Apps!
Let the community do more than just Apps!Let the community do more than just Apps!
Let the community do more than just Apps!Joachim Ritter
 
OSGi on Android - Value Proposition
OSGi on Android - Value PropositionOSGi on Android - Value Proposition
OSGi on Android - Value PropositionJoachim Ritter
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for AcademicsCorinne Weisgerber
 

Andere mochten auch (9)

Mini guida blog aziendali
Mini guida blog aziendaliMini guida blog aziendali
Mini guida blog aziendali
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis Management
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media Dream
 
Everything you ever wanted to know about social media but were afarid to ask.
Everything you ever wanted to know about social media but were afarid to ask.Everything you ever wanted to know about social media but were afarid to ask.
Everything you ever wanted to know about social media but were afarid to ask.
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
 
Let the community do more than just Apps!
Let the community do more than just Apps!Let the community do more than just Apps!
Let the community do more than just Apps!
 
A Bears Den
A Bears DenA Bears Den
A Bears Den
 
OSGi on Android - Value Proposition
OSGi on Android - Value PropositionOSGi on Android - Value Proposition
OSGi on Android - Value Proposition
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for Academics
 

Ähnlich wie I Tweet Therefore I Am

Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conferencemiss604
 
Twitter overview
Twitter overviewTwitter overview
Twitter overviewJason Cross
 
Trade Ideas Twitter 2009
Trade Ideas   Twitter 2009Trade Ideas   Twitter 2009
Trade Ideas Twitter 2009David Aferiat
 
Intro to JS: Build a Twitter Bot
Intro to JS: Build a Twitter BotIntro to JS: Build a Twitter Bot
Intro to JS: Build a Twitter BotJustin Ezor
 
Wsjtwitter4bizfinal 091104090108 Phpapp01
Wsjtwitter4bizfinal 091104090108 Phpapp01Wsjtwitter4bizfinal 091104090108 Phpapp01
Wsjtwitter4bizfinal 091104090108 Phpapp01Creative Direct Limited
 
Social Media Web Marketing Nov 2009 Wk2
Social Media Web Marketing Nov 2009 Wk2Social Media Web Marketing Nov 2009 Wk2
Social Media Web Marketing Nov 2009 Wk2PCM creative
 
Twitter - What, Why, Who & How
Twitter - What, Why, Who & HowTwitter - What, Why, Who & How
Twitter - What, Why, Who & Howpoint2five
 
Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Corinne Weisgerber
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for BusinessLeslie Hughes
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word OutMatt Ganis
 
2 Tweet Not2 Tweet2
2 Tweet Not2 Tweet22 Tweet Not2 Tweet2
2 Tweet Not2 Tweet2The Circuit
 
Social Media: In Theory And In The Field Camt
Social Media: In Theory And In The Field CamtSocial Media: In Theory And In The Field Camt
Social Media: In Theory And In The Field CamtCAMT
 

Ähnlich wie I Tweet Therefore I Am (20)

Cdo
CdoCdo
Cdo
 
Non credit
Non creditNon credit
Non credit
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conference
 
Twitter overview
Twitter overviewTwitter overview
Twitter overview
 
Trade Ideas Twitter 2009
Trade Ideas   Twitter 2009Trade Ideas   Twitter 2009
Trade Ideas Twitter 2009
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
Intro to JS: Build a Twitter Bot
Intro to JS: Build a Twitter BotIntro to JS: Build a Twitter Bot
Intro to JS: Build a Twitter Bot
 
Engaging The Conversation, Presented to the Fort Bend Chamber
Engaging The Conversation, Presented to the Fort Bend ChamberEngaging The Conversation, Presented to the Fort Bend Chamber
Engaging The Conversation, Presented to the Fort Bend Chamber
 
Wsjtwitter4bizfinal 091104090108 Phpapp01
Wsjtwitter4bizfinal 091104090108 Phpapp01Wsjtwitter4bizfinal 091104090108 Phpapp01
Wsjtwitter4bizfinal 091104090108 Phpapp01
 
Social Media Web Marketing Nov 2009 Wk2
Social Media Web Marketing Nov 2009 Wk2Social Media Web Marketing Nov 2009 Wk2
Social Media Web Marketing Nov 2009 Wk2
 
Twitter - What, Why, Who & How
Twitter - What, Why, Who & HowTwitter - What, Why, Who & How
Twitter - What, Why, Who & How
 
Twittering for Pubs
Twittering for PubsTwittering for Pubs
Twittering for Pubs
 
Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Twitter for PR (Public Relations)
Twitter for PR (Public Relations)
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for Business
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word Out
 
Business SM
Business SMBusiness SM
Business SM
 
Sm business
Sm businessSm business
Sm business
 
Sm business
Sm businessSm business
Sm business
 
2 Tweet Not2 Tweet2
2 Tweet Not2 Tweet22 Tweet Not2 Tweet2
2 Tweet Not2 Tweet2
 
Social Media: In Theory And In The Field Camt
Social Media: In Theory And In The Field CamtSocial Media: In Theory And In The Field Camt
Social Media: In Theory And In The Field Camt
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

I Tweet Therefore I Am

Hinweis der Redaktion

  1. Imagine if you will, a cocktail party …
  2. What are the characteristics of a cocktail party?
  3. … a really big one … that’s what Twitter is a lot like
  4. Page design / avatar / layout
  5. Page design / avatar / layout
  6. My influence
  7. Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
  8. Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
  9. Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
  10. Apple corporate has no official Twitter presence while iTunes has 5 – no Steve Jobs account not even …
  11. This one … no idea who
  12. Rather than using the Twitter Web interface