The document provides an overview of Twitter basics. It discusses setting up a Twitter account, including choosing a username and profile photo. It explains how to tweet, including using hashtags, @replies, and retweets. It also covers following others on Twitter, direct messages, lists, and privacy settings. The document aims to teach users Twitter fundamentals in order to begin participating on the platform.
A really concise and action oriented guide to using twitter more effectively targeted at novice users, particularly media folk by someone who has done A LOT of twitter training.
R. molski, polish law in fight against cartelsMichal
This paper presents the basic elements of the Polish anti-cartel regime and suggests
what potential changes would be likely to improve it. Considered here are: the legal
framework of anti-cartel enforcement in Poland as well as the performance of the
Polish antitrust authority in its fight against cartels. Special attention is devoted
to the substantive provisions of the cartel prohibition, investigatory powers of the
antitrust authority, including the leniency programme, and the arsenal of sanctions
available in cartels cases. The paper will show that Poland has sound anti-cartel laws
and an antitrust authority determined to enforce them effectively. Notwithstanding
its generally positive conclusions, the paper will conclude with some suggestions
de lege ferenda which are likely to improve the Polish anti-cartel regime making its
fight against cartels more dynamic.
Wytyczne w zakresie kwalifikowalności wydatków w ramach Programu Inteligentny Rozwój określają warunki kwalifikowalności wydatków oraz wskazują szczegółowe koszty, które mogą być uznane za kwalifikowalne w projektach realizowanych w ramach poszczególnych działań i poddziałań Programu. Dokument uszczegóławia również warunki i procedury określone w Wytycznych Ministra Infrastruktury i Rozwoju z 10 kwietnia 2015 r. w zakresie kwalifikowalności wydatków w ramach Europejskiego Funduszu Rozwoju Regionalnego, Europejskiego Funduszu Społecznego oraz Funduszu Spójności na lata 2014-2020.
Źródło: http://www.poir.gov.pl/Strony/o-programie/dokumenty/Wytyczne-w-zakresie-kwalifikowalnosci-wydatkow-w-ramach-Programu-Operacyjnego-Inteligentny-Rozwoj-2014-2020
A really concise and action oriented guide to using twitter more effectively targeted at novice users, particularly media folk by someone who has done A LOT of twitter training.
R. molski, polish law in fight against cartelsMichal
This paper presents the basic elements of the Polish anti-cartel regime and suggests
what potential changes would be likely to improve it. Considered here are: the legal
framework of anti-cartel enforcement in Poland as well as the performance of the
Polish antitrust authority in its fight against cartels. Special attention is devoted
to the substantive provisions of the cartel prohibition, investigatory powers of the
antitrust authority, including the leniency programme, and the arsenal of sanctions
available in cartels cases. The paper will show that Poland has sound anti-cartel laws
and an antitrust authority determined to enforce them effectively. Notwithstanding
its generally positive conclusions, the paper will conclude with some suggestions
de lege ferenda which are likely to improve the Polish anti-cartel regime making its
fight against cartels more dynamic.
Wytyczne w zakresie kwalifikowalności wydatków w ramach Programu Inteligentny Rozwój określają warunki kwalifikowalności wydatków oraz wskazują szczegółowe koszty, które mogą być uznane za kwalifikowalne w projektach realizowanych w ramach poszczególnych działań i poddziałań Programu. Dokument uszczegóławia również warunki i procedury określone w Wytycznych Ministra Infrastruktury i Rozwoju z 10 kwietnia 2015 r. w zakresie kwalifikowalności wydatków w ramach Europejskiego Funduszu Rozwoju Regionalnego, Europejskiego Funduszu Społecznego oraz Funduszu Spójności na lata 2014-2020.
Źródło: http://www.poir.gov.pl/Strony/o-programie/dokumenty/Wytyczne-w-zakresie-kwalifikowalnosci-wydatkow-w-ramach-Programu-Operacyjnego-Inteligentny-Rozwoj-2014-2020
If you're into campaigning or direct action this training presentation offer handy tips on understanding what Twitter is, how it works, how to build a community of followers as well as examining a case study of its use in direct action
This deck was created to help educate my team on 1) What Twitter Is 2) Why It's Important and 3) How To Get Started. This is a great way to introduce Twitter into your business and to see the relevancy.
Getting Started on Twitter: Communities and ConversationsSpencer Keralis
Presented by Anjum Najmi and Ephraim Freese at the UNT Digital Scholarship Co-Operative's Day of DH 2013. The presenters discussed how to get started in Twitter, described the basics of establishing an account, following others, developing followers, writing Tweets, and using hashtags (#), and discussed practical uses for the social media platform for academics and professionals. This workshop was intended for beginners who are curious about Twitter and looking to get started, but we encouraged more advanced users to attend to brush up on their practice and share their knowledge and experience.
This event was cosponsored by the UNT Libraries' Digital Projects Unit and the Digital Scholarship Co-Operative for the international Day in the Life of Digital Humanities (Day of DH).
An updated version of my social media strategy recommendations for Yale Repertory Theatre in 2010. Incorporates new research, and corrects previous formatting issues.
How to Use Blogs, Twitter & LinkedIn for Legal ProfessionalsRocket Matter, LLC
Finally, the straight dope on social media!
Blogging can help legal professionals position themselves build a web presence, protect their reputations, and build business. Social media tools like Twitter and LinkedIn can also help you grow your practice, but how much really, and how much time should you spend on them?
Hosted by our friends at Fastcase®, Smarter Legal Research. Find out more at http://www.fastcase.com.
For more Rocket Matter insight and commentary, please check out http://www.legalproductivity.com
A no nonsense presentation for those who want to learn how to start using Twitter. A brief explanation about what Twitter is, who uses Twitter, and how businesses are using it.
Simple slides illustrating how to tweet, reply, & privately message others on Twitter.
Also includes the easiest path to getting started by setting up your profile and finding interesting folks to follow.
The presentation ends with tips for better tweeting and simple ways to gain more followers.
Getting dumped by a client is tricky business, but you really can get over it and land better, more profitable clients in the future. I wrote a guide on my process to go beyond a client breakup and start scoring new business. Did I miss anything?
More Related Content
Similar to Social Media Tools - Twitter, Facebook and LinkedIn 101
If you're into campaigning or direct action this training presentation offer handy tips on understanding what Twitter is, how it works, how to build a community of followers as well as examining a case study of its use in direct action
This deck was created to help educate my team on 1) What Twitter Is 2) Why It's Important and 3) How To Get Started. This is a great way to introduce Twitter into your business and to see the relevancy.
Getting Started on Twitter: Communities and ConversationsSpencer Keralis
Presented by Anjum Najmi and Ephraim Freese at the UNT Digital Scholarship Co-Operative's Day of DH 2013. The presenters discussed how to get started in Twitter, described the basics of establishing an account, following others, developing followers, writing Tweets, and using hashtags (#), and discussed practical uses for the social media platform for academics and professionals. This workshop was intended for beginners who are curious about Twitter and looking to get started, but we encouraged more advanced users to attend to brush up on their practice and share their knowledge and experience.
This event was cosponsored by the UNT Libraries' Digital Projects Unit and the Digital Scholarship Co-Operative for the international Day in the Life of Digital Humanities (Day of DH).
An updated version of my social media strategy recommendations for Yale Repertory Theatre in 2010. Incorporates new research, and corrects previous formatting issues.
How to Use Blogs, Twitter & LinkedIn for Legal ProfessionalsRocket Matter, LLC
Finally, the straight dope on social media!
Blogging can help legal professionals position themselves build a web presence, protect their reputations, and build business. Social media tools like Twitter and LinkedIn can also help you grow your practice, but how much really, and how much time should you spend on them?
Hosted by our friends at Fastcase®, Smarter Legal Research. Find out more at http://www.fastcase.com.
For more Rocket Matter insight and commentary, please check out http://www.legalproductivity.com
A no nonsense presentation for those who want to learn how to start using Twitter. A brief explanation about what Twitter is, who uses Twitter, and how businesses are using it.
Simple slides illustrating how to tweet, reply, & privately message others on Twitter.
Also includes the easiest path to getting started by setting up your profile and finding interesting folks to follow.
The presentation ends with tips for better tweeting and simple ways to gain more followers.
Getting dumped by a client is tricky business, but you really can get over it and land better, more profitable clients in the future. I wrote a guide on my process to go beyond a client breakup and start scoring new business. Did I miss anything?
Ignite Fort Collins - Sponsor Slides for Ignite Fort Collins 14 - June 14, 2013Nick Armstrong
Ignite Fort Collins - Sponsor Slides for Ignite Fort Collins 14 - June 14, 2013.
The sponsor slides are created by WTF Marketing to lighten the mood between talks and give each speaker a chance to walk on stage to a happy audience.
Featuring The Coloradoan, Waterpik, Poudre River Public Library, WTF Marketing, Blue Skies Marketing, NerdyMind Marketing, Haunted Game Cafe, Sign-A-Rama Fort Collins, Chillico Studios, and 1K Robots Design.
Every business owner has experienced that moment when things have gone horribly, horribly off-track.
Each time this has happened in my business, I've used the same pathway to get to a successful resolution... Adding and subtracting some things along the way, the Bad Client Situation Triage Toolkit was born.
WordPress Security is Not Rocket Science - Five easy steps any non-geek can take right now to make your blog more secure. Designed with Haiku Deck by Nick Armstrong of WTF Marketing.
12 Things Your Web Developer/WebGuy Wishes you Knew - all the things your geek doesn't tell you about but secretly hopes you'll someday figure out about your website.
By Nick Armstrong of WTF Marketing
I wrote the sponsor slides for Ignite Fort Collins 13 which took place on February 28th, 2013 - here's what I came up with. Not all of them were seen live. They're meant to be somewhat edgy, funny, unique, or obscure. The ones that were too obscure didn't get shown.
How to overcome your tendency to dilute your message by jumping on every "next big thing" social media platform... and what you can do right now in 12 steps to get back on track.
How to identify and avert Social Media Schizophrenia and Technology Overload and focus on what really matters: creating kick-ass content.
WARNING: This is the OLD version of this presentation... the new, shiny 2013 version can be found here: http://www.slideshare.net/NickArmstrong/social-mediaschizophrenia
Creating your own website can be tricky. WordPress makes creating and managing your own website much, much easier. I've created this presentation to walk business owners through the steps.
Nick Armstrong - Ignite Spatial NoCo #2 - How To Use GIS To Get Away With MurderNick Armstrong
My talk from Ignite Spatial NoCo #2 - How to use GIS to get away with Murder! -- during the presentation I actually shot my former boss with a Nerf shotgun (he played along with it).
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Social Media Tools - Twitter, Facebook and LinkedIn 101
1. Twitter Basics
140 characters of pure awesomeness
By N ic k A rmst ro ng :: @ImN ic kArmst ro ng
h tt p://w w w.IAmN ic kArmst ro ng.com
Thursday, August 18, 11
2. Hi - I’m Nick!
I’m 25
2 awards for web
design in Colorado
state-wide
competition
Doing web design for
13 years
Thursday, August 18, 11
3. What We’re Covering:
Twitter basics
Account creation, optimizing, best practices, finding followers, metrics and stats, tools
LinkedIn basics
Optimizing your profile, search results, metrics and stats
Facebook basics
Page vs Profile, Privacy, Optimization, Separation of Content
Social Media Strategy for Business basics
Toolkits, Teams, and Optimization, $
Thursday, August 18, 11
4. What is Twitter?
One-to-Many instant messaging
140 character messages or less - called a Tweet
Each user has a username and avatar (picture)
“Follow” users to see their Tweets
Messages appear in the Main Feed (AKA Stream,
Timeline)
Thursday, August 18, 11
5. 5 Reasons Twitter is Useful
1 - Potential for huge Word of Mouth promotion
2 - Potentially improved customer service
3 - Incredibly fast information gathering
4 - Easier Online Reputation Management
5 - Improved Google Rankings
... but - it depends on how you use it!
Thursday, August 18, 11
6. No More Excuses...
Social media is a
participation-based culture.
You have to participate to get
the most value.
But, how much, how often,
and how long you participate
is entirely up to you.
Source: http://www.flickr.com/photos/furiousgeorge81/177926979/
Thursday, August 18, 11
7. Only Have 5 Minutes?
Yes, you can have a useful exchange using social
media tools if you only have 5 minutes.
Nobody cares what you had for breakfast.
They care about VALUE you contribute.
Value is subjective.
Thursday, August 18, 11
9. Setting Up Your Account
Go to www.Twitter.com
Click on “Sign up now”
Enter your full name
Enter a descriptive username
Enter a strong password
Enter your common email address
Answer the captcha, click on “Create
my account”
Follow the steps to find friends or
skip ‘em for later
Thursday, August 18, 11
10. Sweet!
Okay, now what?
Thursday, August 18, 11
11. Your avatar and username
How many characters you have left (140 is the limit!)
# of people you are following
New tweets since
Your last tweet # of people following you
the page loaded
# of lists you’re featured on The home feed
Mentions
Username and avatar feed
Someone’s username
Click on either to go (this is a mention)
to this person’s profile
Where the Tweet came from The retweet feed
How long ago something was tweeted
Favorite this tweet
(publicly visible!)
“New”
Reply to this tweet (creates a link) retweet
Tweet, of course!
But about what?
Thursday, August 18, 11
12. What’s in a Tweet?
@ signifies the next
word is a username
@’s are used in @
Replies and ReTweets
# signifies the next word
is a hashtag
d and a space, then a
user name sends a
direct message
Thursday, August 18, 11
13. @ Replies
@ Replies
If a Tweet starts with @ - it is an “at reply”.
You can click on an @UserName to go to that
person’s profile.
Whenever your name appears in an @ reply, it
appears in your mentions feed (the menu
option that has @YourUserName)
Example: “@LeoLaporte Hey Leo - caught your
show - it rocks!”
Only my followers (people who follow
@ImNickArmstrong) who also follow
@LeoLaporte will see the tweet.
If you put more than one username, they will
see the tweet too. Example: “@LeoLaporte
@AmberMac - Rock on.
Thursday, August 18, 11
14. Direct Messages
Direct Messages sent to you
are only seen by you.
Direct Messages sent by you
are only seen by the person
you sent it to.
You can send a direct message
to only one person at a time.
You can’t send a direct
message to someone who isn’t
following you.
Thursday, August 18, 11
15. Old-Style ReTweets
ReTweeting is sharing someone
else’s Tweets with your network.
It’s a cool way to show respect
on Twitter!
“RT” and “via” are synonymous
Copy and Paste the text you
want to share, and type RT
@UserName at the beginning or
the end of the Tweet - where
username is the name of the
original author (@TheVanguard
here)
Thursday, August 18, 11
16. Click here
Ron retweeted this to his followers
(even if they’re not following me)
“New” ReTweets
Exposure to Tweeps you don’t know!
Thursday, August 18, 11
17. Hashtags and Searches
When you add # before a word, it
becomes a Hashtag.
Any tweet with that Hashtag in it
appears in the results when you
search for that tag.
Hashtags (and terms) are
searchable on Twitter. If a LOT of
people tweet that hashtag (or
term), it becomes a trending topic
and is listed on Twitter.com and
your sidebar.
You can Google search to see what
a hashtag means.
Thursday, August 18, 11
18. Enter search term here
Searches
Like the CIA, only less scary...
Thursday, August 18, 11
19. Your Home Feed
The Tweets from
everyone you follow
appear here. Your
Tweets will appear
here, too!
Thursday, August 18, 11
20. Your Mentions Feed
This is the
“@YourUserName”
menu item.
Any tweet that has
your @UserName in it
will appear here.
Thursday, August 18, 11
21. When you mouse over
a Tweet, three icons appear.
One is for replying,
one is for “new” RTs
the other is for Favoriting.
Click on the star to favorite.
Your favorites appear
in their own feed.
These are visible to anyone.
You can Favorite Tweets.
Come back to them later, share them, make a
highlight reel - whatever feels right.
Thursday, August 18, 11
22. Adding Location
Adding Location to your Tweets can be
fun, but also quite dangerous if you
have a stalker.
Adding location adds a clickable link to
a Google map of your location.
Turn these on and off in Settings:
Thursday, August 18, 11
23. Lists
Creates a custom
stream of just the
users on the list.
You can be added to a
list without your
permission or
knowledge.
People can follow
your public lists.
Thursday, August 18, 11
24. Create a New List
Click on “New List” on the
sidebar
Give the list a name
Describe the list (helpful for
SEO)
Determine if the list is public or
private
Private lists are only seen by you
Thursday, August 18, 11
25. Follow a List
Find by clicking
on “Lists” from
a person’s
profile.
Follow just like
you’d follow a
person.
Click here to follow
Thursday, August 18, 11
26. Lists you’re on Lists you’ve made or follow
Click here
See Where You’re Listed
Street Cred++
Thursday, August 18, 11
27. What list feeds look like
Click on the list you want to see from your sidebar
Thursday, August 18, 11
28. Basic Info
Use your real name -
you’re easier to find!
Don’t change
usernames often.
People will search for
you using your e-mail
address, so use your
most common one.
Thursday, August 18, 11
29. Basic Info - Part 2
Put your website into the
More Info URL
The One Line Bio should
have specific keywords
you want associated with
you - web designer, for
example.
Use a SPECIFIC location!
City and state. You’ll be
easier to find.
Thursday, August 18, 11
30. Add a Profile Picture
Your smiling face works best!
Try to use the same avatar across all your social media accounts
Thursday, August 18, 11
31. Be Sure To Change
Your Background/Theme!
Try http://tweetygotback.com/
Thursday, August 18, 11
32. Protecting Your Account
Only people you
approve will be able
to see your tweets
Not valuable for SEO
Harder to gain a
following
Thursday, August 18, 11
33. Finding People to Follow
If you know their username, go
right to their page and click on
the “Follow” button.
You can use your existing
networks (Gmail, Yahoo!, and
AOL) to find Twitter friends.
You can also use the Search
function by clicking on “Find
People”.
WeFollow.com, MrTweet.com,
Twitter.Grader.com
Thursday, August 18, 11
34. Managing your Followers
It’s okay to unfollow if you get tired of
someone.
It’s okay to block people you don’t want to
follow you.
Find a spammer? Click “Report @SoAndSo
for spam”!
No notifications are sent when you block,
unfollow or report for spam.
Don’t feel compelled to follow back
everyone who follows you.
Look for the “Verified Account” logo on
celebrities’ profiles. Not there? It’s probably
a fake.
Thursday, August 18, 11
35. Twitter Soft ware
Desktop: TweetDeck and Seesmic
Web: HootSuite, Seesmic
Phone: Tweetie, TwitterBerry
Allows you to organize multiple accounts, see your Home Stream, Mentions Stream, Favorites,
and Direct Messages - and any searches you create, all in one screen.
You can even manage Facebook (Pages and Profiles), LinkedIn and MySpace accounts!
Thursday, August 18, 11
36. Twitter Websites
WeFollow.com
People-powered Twitter Yellow Pages
Mr. Tweet (MrTweet.com)
Recommends relevant people
FriendOrFollow.com
Easily see who you’re following that
isn’t following you back.
Twitter.Grader.com
Compare your Twitter account with
others in your area.
Source: http://www.flickr.com/photos/carrotcreative/2511539541/
Thursday, August 18, 11
37. Staying Safe
Use a strong password - at least one
upper-case letter, one lower-case letter,
one number, and one symbol.
Don’t click on DM links from people
you don’t know (or that look
suspicious!)
Do not enter your username and
password anywhere but the official
Twitter site. Any 3rd party sites worth
using will use OAUTH. OAUTH is a
safe way to use 3rd party sites without
giving away your username and
password Usually there’s a link on
those sites for “OAUTH” - click this
pop-up will appear:
Thursday, August 18, 11
38. Assignment
Build your own Twitter profile!
Thursday, August 18, 11
40. LinkedIn Basics
5,000 Lifetime Network Invites.
“3-deep” - you can see friends of friends of friends.
Penalties for attempting to connect with those you
don’t know (at least, if they say they don’t know you).
Keywords, Keywords, Keywords.
Thursday, August 18, 11
41. Basic Tips
Keep a copy of your
LinkedIn profile in a
Word document.
Use the Q+A section to
gain expertise.
Join groups to expand
your network without
using invites.
Source: http://www.flickr.com/photos/koalazymonkey/3596829214/
Thursday, August 18, 11
42. Quick Optimization
Use the “Other” URL field to give
each link a custom title.
Select all the options under
“Opportunity Preferences”.
Create a Public Profile URL - your
name works best, then check all
options. This makes everything on
your LinkedIn profile except
contact info public (even to
someone who doesn’t have
LinkedIn). This benefits your
personal SEO but hurts your
privacy.
Thursday, August 18, 11
43. Quick Metrics
LinkedIn shows you
who visits your profile
(more or less).
You can also use
specific Bit.ly links to
track if people are
sharing or clicking on
your content from
LinkedIn status
updates.
Thursday, August 18, 11
44. Big Mistakes
Don’t put anything
besides your first and
last names in the
appropriate fields!
Don’t use a bad photo!
Don’t keyword stuff!
Source: http://www.flickr.com/photos/deltamike/2337072843/
Thursday, August 18, 11
45. Assignment
Follow the steps on the Quick Optimization slide.
Thursday, August 18, 11
46. Facebook Basics for
Business
Not just for kegger headstands and stalking anymore...
... okay, maybe mostly for stalking.
Thursday, August 18, 11
47. What is Facebook?
If Facebook were a country,
it’d be the 5th largest in the
world (by population)
Personal Profiles and Business
Pages
Groups, Events, Applications
Walls, Status Updates, Photo
Albums
Source: http://www.flickr.com/photos/larimdame/2055808110/
Pokes
Thursday, August 18, 11
48. Why Use Facebook?
Easily share pictures,
videos, and notes
Easy integration with
other social media tools
Everybody and their
mom is on Facebook
(literally). Source: http://www.flickr.com/photos/laughingsquid/986548379/
Thursday, August 18, 11
49. Sign Up
Create a personal
profile using the form
on Facebook.com
You can also create a
page for your business
here (not
recommended - you
lose out on some cool
features, like apps).
Thursday, August 18, 11
50. “T News”
op
Your profile Account
Friend Requests Messages Updates Contextual Search
Most Recent Stories Settings
Requests
Update your status here
Create friend Friend
lists here Suggestions
Share this status
Like this status
Comment on this status
Time/date status was published Events
Expand
comments Pokes
The Home Screen
Thursday, August 18, 11
51. Privacy
Safest: set everything
to “Friends Only”
Set up Friend Lists
and revoke privileges
as needed
Set Privacy settings
now, before they
become an issue
Thursday, August 18, 11
52. Privacy - Part 2 1
Any application your
friends add can also
see your information
2
Revoke application
privileges before you
add friends
Each photo album has
to be set individually
Thursday, August 18, 11
53. Privacy - Let’s Do It Now
Click Account -> Privacy Settings.
Click through each of Profile,
Search, News Feed and Wall, and
Applications, turning the settings to
“Friends Only”.
Uncheck any option that you don’t
understand.
You can also block people here - if
you block someone, you disappear
to them entirely.
Make sure you block them first!
Thursday, August 18, 11
54. Privacy - Friend Lists 1
Allows you to segment 2
your friends.
Useful for pestering
aunts and ex-
girlfriends.
Also useful for
business contacts.
Thursday, August 18, 11
55. 1
Click here
or here
2
Create a Friend List
Thursday, August 18, 11
59. Account -> Edit Friends
Click the X...
Removing a friend
Thursday, August 18, 11
60. Page vs Profile
Page Profile
For Businesses For People
Has Fans (and stats!) Has Friends (and lists!)
Create content as Biz Create content as YOU
Won’t get banned for Will get banned for Biz
Biz use use
Thursday, August 18, 11
61. Huge Mistake #1:
Creating a personal profile
for a business.
Thursday, August 18, 11
62. Huge Mistake #2:
Allowing some high school
kid to manage your
Facebook marketing.
Thursday, August 18, 11
63. Huge Mistake #3:
Thinking your high school
friends give a crap about
your business life.
Thursday, August 18, 11
64. Separate The Content
Use the lock button to determine who can see
what you post (you can set a default or change it
for each item you post).
Thursday, August 18, 11
65. The Best Pages:
Have a landing page
for new visitors
Allow fans to post
content along with the
admins
Encourage comments
Use the FBML app
Thursday, August 18, 11
66. FBML
Use it like an HTML-enabled
text box to customize your
page.
Install by searching for the
Static FBML app and clicking
on “Add to My Page”
Thursday, August 18, 11
67. Assignment
Lock down your Facebook privacy settings.
Thursday, August 18, 11
69. SETH GODIN’S HIERARCHY
Attitude - Who you are and what you believe in.
Approach - How you want to go about doing it.
Goals - Things you want to accomplish. (3/6/9/12 mo)
Strategy - Plans to accomplish your goals.
Tactics - Executable, measurable parts of strategies.
Execution - Do not start here. Most start here.
Thursday, August 18, 11
70. CHOOSING TOOLS
Focus on your objective and your strengths.
If your objective is to produce interactive content, a
written blog might not be the best way to go.
If you have “a face for radio”, you might not want to
do a video cast (or at least, find someone attractive
first).
Remove any barriers to entry.
Thursday, August 18, 11
71. NUMBERS ARE
UNIMPORTANT
The best measure of your network is resonance.
Resonance: your content is shared, reacted to,
commented on, disputed, argued with, hated, loved,
whatever.
Resonance has two traits: velocity and volume.
Faster + Louder = High Resonance.
Thursday, August 18, 11
72. THE 101’S OF CONTENT
Always add value: we don’t care what you had for
breakfast.
We DO care that the waiter was amazing. We DO
care that it was the best coffee you ever had, if you
tell us what kind and where to find it.
Always Add Value. (But remember value is subjective.)
Thursday, August 18, 11
73. CONTENT, CONTEXT,
CONSISTENCY
Create a publication schedule and STICK TO IT.
Create content for your audience - are they ADD?
Do short video or audio. Keep it relevant, fresh and
engaging. Ask questions, respond quickly to comments
or feedback.
Add Value - link wherever possible.
Thursday, August 18, 11
74. RULES OF ENGAGEMENT
At least 50% of what you do should be interactions
and conversations (@ replies, comments on blogs,
whatever).
30% of what you do (or more) should be education.
10% can be off-topic, random, whatever.
10% can be sales or pitches or... whatever.
Thursday, August 18, 11
75. MEASURE RESONANCE
Track any link you share.
Use http://bit.ly to create links you can track in real-
time.
Use Google Analytics to track your website’s visitors.
Be consistent with your sharing and measuring rates.
Thursday, August 18, 11
76. NEGATIVE PUBLICITY...
... is just an opportunity for you to demonstrate how
awesome your customer service is.
Do not give a fake apology or get defensive - say “I’m
Sorry” then make it better.
Only delete or take retaliatory action when the
negative publicity is 1) Patently False or 2) Spammed
Thursday, August 18, 11
77. EYE ON THE PRIZE
The more value you add, the less you will have to sell.
10% pitches/sales can be too much sometimes.
Network effectively; know who can be pitched and who
shouldn’t be.
Don’t resort to Squeeze Pages or Spammy Mailing Lists.
Thursday, August 18, 11
78. ASSEMBLE YOUR TEAM
You may need:
Enough content creators to publish regular content
A creative lead
A marketing lead
A metrics/analytics lead
A damage control/customer service lead
Thursday, August 18, 11
79. ASSIGNMENT
Outline Seth Godin’s Hierarchy of Success for your
business.
Thursday, August 18, 11
80. Q+A Time - Thank You!
Time to ask and answer specific questions
NickMArmstrong@gmail.com
www.IAmNickArmstrong.com
Twitter: @ImNickArmstrong (say hi!)
Thursday, August 18, 11