This document provides an overview of Twitter, including what it is, how it works, types of tweets, its growth over time, and how businesses can use it. Key points include that Twitter allows private and public messaging of short messages called tweets, it has grown dramatically since being founded in 2006 with over 1.8 billion tweets per day, and businesses can use it for purposes like marketing, customer service, and gaining competitive insights.
14. Types of Tweets This is a tweet that will be seen in the public timeline and by my followers D fred This is a private tweet that will only be seen by “fred” This is a tweet with hashtags that will be seen in the #public #timeline and by my followers @fred This is a tweet that will seen by “fred” even if he isn’t following me and will be seen in the public timeline and by my followers This is a tweet with a URL – http://gibbsuniversal.com/sentimeter This is a tweet with a shortened URL – http://bit.ly/44iVMz RT @fred This is a re-tweet that will that will seen by “fred” even if he isn’t following me, in the public timeline, and by my followers This is a tweet that will that will seen in the public timeline, and by my followers that asks for a re-tweet; Pls RT
49. Kogi Korean BBQ Taco Truck http://kogibbq.com/ 300 to 800 people each time it parks http://www.latimes.com/features/printedition/food/la-fo-kogi11-2009feb11,0,3007869.story
69. If you ignore Twitter or any other social media you will be missing out on a strategic business opportunity. One your competitors will not miss … Yes, you absolutely should care!
… a really big one … that’s what Twitter is a lot like
Page design / avatar / layout
Page design / avatar / layout
My influence
Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
Mashable: The security hole, first reported by The L.A. Times , reveals that, by just typing “site: twitter.com/*username* ” (replacing *username* with the Twitter name of a protected account), you can see most or all of the tweets of an account. And it’s already being used to see the tweets of Bill Clinton , and others. Apparently, while you can’t directly access a protected Twitter account, Google’s crawling bots can pass right by without any problem. By looking at the Google results, you can get a sense of what that person is tweeting about. For example, here’s what comes up when you search Bill Clinton:
Apple corporate has no official Twitter presence while iTunes has 5 – no Steve Jobs account not even …