SlideShare a Scribd company logo
1 of 8
Twitter Tips
Author – David Tragardh
January 2011
Why Twitter?
          Twitter Followers




               Reach




            New Clients
Twitter Management Strategy
Increasing your digital Klout, Influence and Followers

   Apply the following strategies to both your personal and business
   Twitter accounts.

   5. Follow everyone who follows you
       •   Use the website http://tweepi.com/ (free product) to filter everyone who
           follows you who you don’t follow, and use the tool to follow them back.
   6. Content
       •   Produce as much original content as possible. Re-tweet, but put more
           effort into creating content and having your own personal opinion. Use
           links where possible to your website or social media assets.
Twitter Management Strategy
 3. Engagement
    •   Engage with the right people. Participate in as much conversation as
        possible. Search your interest categories to find the right people.


 4. Follow
    •   Follow the right people. Social Star will provide a list of people to follow
        and engage with or search #tags for people credible in those areas.


 5. Offline Relationships
    •   Build offline relationships with influencers in the social space. Schmooze
        them, and they will re-tweet your comments.
Twitter Management Strategy
 1. # Tags
    •   Join the conversation using # tags. If you attend industry event, most likely
        they will have official # tags. They will be available on event websites and
        promoted during events. Follow relevant people who tweet about the topic
        you are tweeting about and engage with them.


 7. @ Mention Influencers
    •   @tag mega influencers in your posts. You can’t direct message them but
        you can @tag them, they will see you have tagged them and they may
        publically RT a reply. This is a good tactic to increase Klout and increase
        followers.
Twitter Management Strategy
 8. Quotes
    •   Inspirational and famous quotes (especially in your industry) are the most
        re-tweeted content on Twitter.

 2. Always Active
    •   If you stop tweeting for just a number of days, your influence will go down.


 10. Un-follow people who don’t reciprocate
    •   If you follow people in the field, and if they ad no benefit of content or don’t
        follow you back, un-follow them. You can discover everyone who you
        follow, but who does not follow you by using the tool http://tweepi.com/
Twitter Management Strategy
 11. Recognition
    •   Publically thank people for re-tweets, and ask them more questions for
        further engagement.
 12. Trends
    •   Follow the Twitter trending topics and if relevant, make comment, use the
        #tag..
 3. Pictures
    •   Pictures get re-tweeted more frequently If you post photos and video. Use
        the Tout application on your iPhone to do 15 second video posts to Face
        book and Twitter.
 4. Buffer
    •   You can use http://bufferapp.com to give you quotes or schedule tweets
        for free.
Want professional help?
       Visit Social Star www.socialstar.com.au
               dave@socialstar.com.au
              andrew@socialstar.com.au
         Follow us on Twitter @social_star_
           David Tragardh @davidtragardh
                Andrew Ford @sirford

    WE DELIVER MORE TWITTER FOLLOWERS...

More Related Content

Viewers also liked

Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...
Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...
Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...Andrew Ford
 
Tablas de repaso de las declinaciones griegas
Tablas de repaso de las declinaciones griegasTablas de repaso de las declinaciones griegas
Tablas de repaso de las declinaciones griegasRafael Ayuso
 
Side Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsSide Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsIoannis Stais
 
Social Star e-ttraction Presentation - Social Media for Sales
Social Star e-ttraction Presentation - Social Media for SalesSocial Star e-ttraction Presentation - Social Media for Sales
Social Star e-ttraction Presentation - Social Media for SalesAndrew Ford
 
Pakistan trade policy
Pakistan trade policyPakistan trade policy
Pakistan trade policyRaXi Abid
 

Viewers also liked (8)

Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...
Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...
Andrew Ford at Social Star Webinar on how to get more referrals from Linkedin...
 
Social star
Social starSocial star
Social star
 
Tablas de repaso de las declinaciones griegas
Tablas de repaso de las declinaciones griegasTablas de repaso de las declinaciones griegas
Tablas de repaso de las declinaciones griegas
 
Jokes
JokesJokes
Jokes
 
Scratch 2003
Scratch 2003Scratch 2003
Scratch 2003
 
Side Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsSide Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile Applications
 
Social Star e-ttraction Presentation - Social Media for Sales
Social Star e-ttraction Presentation - Social Media for SalesSocial Star e-ttraction Presentation - Social Media for Sales
Social Star e-ttraction Presentation - Social Media for Sales
 
Pakistan trade policy
Pakistan trade policyPakistan trade policy
Pakistan trade policy
 

Recently uploaded

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Social star twitter tips

  • 1. Twitter Tips Author – David Tragardh January 2011
  • 2. Why Twitter? Twitter Followers Reach New Clients
  • 3. Twitter Management Strategy Increasing your digital Klout, Influence and Followers Apply the following strategies to both your personal and business Twitter accounts. 5. Follow everyone who follows you • Use the website http://tweepi.com/ (free product) to filter everyone who follows you who you don’t follow, and use the tool to follow them back. 6. Content • Produce as much original content as possible. Re-tweet, but put more effort into creating content and having your own personal opinion. Use links where possible to your website or social media assets.
  • 4. Twitter Management Strategy 3. Engagement • Engage with the right people. Participate in as much conversation as possible. Search your interest categories to find the right people. 4. Follow • Follow the right people. Social Star will provide a list of people to follow and engage with or search #tags for people credible in those areas. 5. Offline Relationships • Build offline relationships with influencers in the social space. Schmooze them, and they will re-tweet your comments.
  • 5. Twitter Management Strategy 1. # Tags • Join the conversation using # tags. If you attend industry event, most likely they will have official # tags. They will be available on event websites and promoted during events. Follow relevant people who tweet about the topic you are tweeting about and engage with them. 7. @ Mention Influencers • @tag mega influencers in your posts. You can’t direct message them but you can @tag them, they will see you have tagged them and they may publically RT a reply. This is a good tactic to increase Klout and increase followers.
  • 6. Twitter Management Strategy 8. Quotes • Inspirational and famous quotes (especially in your industry) are the most re-tweeted content on Twitter. 2. Always Active • If you stop tweeting for just a number of days, your influence will go down. 10. Un-follow people who don’t reciprocate • If you follow people in the field, and if they ad no benefit of content or don’t follow you back, un-follow them. You can discover everyone who you follow, but who does not follow you by using the tool http://tweepi.com/
  • 7. Twitter Management Strategy 11. Recognition • Publically thank people for re-tweets, and ask them more questions for further engagement. 12. Trends • Follow the Twitter trending topics and if relevant, make comment, use the #tag.. 3. Pictures • Pictures get re-tweeted more frequently If you post photos and video. Use the Tout application on your iPhone to do 15 second video posts to Face book and Twitter. 4. Buffer • You can use http://bufferapp.com to give you quotes or schedule tweets for free.
  • 8. Want professional help? Visit Social Star www.socialstar.com.au dave@socialstar.com.au andrew@socialstar.com.au Follow us on Twitter @social_star_ David Tragardh @davidtragardh Andrew Ford @sirford WE DELIVER MORE TWITTER FOLLOWERS...