This document provides statistics and information about Twitter usage from 2009-2011. Some key points include:
- Twitter grew from 30 million tweets per day in 2009 to over 230 million tweets per day in 2011.
- Women tweet more frequently than men and follow more accounts on average.
- Peak tweeting days are Mondays and Tuesdays which see 16% of total weekly volume each.
- The most retweeted tweet was sent by Twitter creator Jack Dorsey in 2006.
- Universities can benefit from official Twitter accounts to engage students, alumni, and the local community.
Social media has a powerful place in crisis management not only as a way to get notifications and status messages out but to also gather intelligence about events and gather feedback. This presentation by Mark Gibbs at Everbridge's Notification World conference introduces social media and then focuses on the use of and technology behind Twitter.
Debunking Social Media Myths - A Guide for Media ExecutivesNeil Foote
Neil Foote, a veteran media executive and journalism professor at the Mayborn School of Journalism, sheds insights on how to create a social media strategy for your newspaper, television or radio station or website.
Social media has a powerful place in crisis management not only as a way to get notifications and status messages out but to also gather intelligence about events and gather feedback. This presentation by Mark Gibbs at Everbridge's Notification World conference introduces social media and then focuses on the use of and technology behind Twitter.
Debunking Social Media Myths - A Guide for Media ExecutivesNeil Foote
Neil Foote, a veteran media executive and journalism professor at the Mayborn School of Journalism, sheds insights on how to create a social media strategy for your newspaper, television or radio station or website.
What is social media?
Where does Twitter fit?
What are the key things to know about Twitter?
Top 3 good, bad, useful and examples of how Twitter is being used in third sector (voluntary and community / non-profit organisations)
Fundamentals for the New Era PR Pro with Sarah EvansCision
Watch the webinar replay, free: http://bit.ly/1jYI3bs
PR is evolving as social and digital become ubiquitous. Understanding the full scope of emerging PR opportunities is critical to success.
Learn how to plan, share and engage in this brave new world with tactics from PR strategist Sarah Evans. Watch the free replay of her webinar to:
-Create credible content by thinking like a producer, editor and journalist.
-Improve workflow efficiency with real-time tips and tools.
-Ensure future organizational and individual success by looking at the big picture.
Don’t let the future pass you by. Watch Sarah’s webinar here: http://bit.ly/1jYI3bs
About the Speaker:
Sarah Evans is the owner of Sevans Strategy, a public relations and new media consultancy. She created and moderates #Journchat, the first-ever weekly live tweetchat for PR pros, journalists and bloggers. Sarah has been listed in Vanity Fair’s America’s Tweethearts, Forbes’ 14 Power Women to Follow on Twitter, and Entrepreneur’s Top 10 Hot Startups.
The Circuit on September 24, 2009 - Breakfast BYTES
Doug Ross, Vice President and Chief Technology Officer Western & Southern Financial Group (W&S) presented this outstanding Breakfast BYTES presentation on the Enterprise Use of Twitter.
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
Growing Your Business with Twitter: An Infoboom WebinarPaul Gillin
Twitter is the hottest new social networking tool, but it can be dense and confusing to the uninitiated. Successful users are finding that Twitter can deliver a gusher of value, from market intelligence to sales leads, but unlocking that value requires understanding the unique characteristics and culture of the Twitter community.
This webinar looks at the dynamics of Twitter and how to apply it to your business. You'll learn:
Who should “tweet” for your company;
How to create a unique and compelling Twitter presence;
How to grow a quality follower base;
The value of retweets and hash tags;
How to express yourself in 140 characters; and
The low-hanging fruit of business value.
What is social media?
Where does Twitter fit?
What are the key things to know about Twitter?
Top 3 good, bad, useful and examples of how Twitter is being used in third sector (voluntary and community / non-profit organisations)
Fundamentals for the New Era PR Pro with Sarah EvansCision
Watch the webinar replay, free: http://bit.ly/1jYI3bs
PR is evolving as social and digital become ubiquitous. Understanding the full scope of emerging PR opportunities is critical to success.
Learn how to plan, share and engage in this brave new world with tactics from PR strategist Sarah Evans. Watch the free replay of her webinar to:
-Create credible content by thinking like a producer, editor and journalist.
-Improve workflow efficiency with real-time tips and tools.
-Ensure future organizational and individual success by looking at the big picture.
Don’t let the future pass you by. Watch Sarah’s webinar here: http://bit.ly/1jYI3bs
About the Speaker:
Sarah Evans is the owner of Sevans Strategy, a public relations and new media consultancy. She created and moderates #Journchat, the first-ever weekly live tweetchat for PR pros, journalists and bloggers. Sarah has been listed in Vanity Fair’s America’s Tweethearts, Forbes’ 14 Power Women to Follow on Twitter, and Entrepreneur’s Top 10 Hot Startups.
The Circuit on September 24, 2009 - Breakfast BYTES
Doug Ross, Vice President and Chief Technology Officer Western & Southern Financial Group (W&S) presented this outstanding Breakfast BYTES presentation on the Enterprise Use of Twitter.
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
Growing Your Business with Twitter: An Infoboom WebinarPaul Gillin
Twitter is the hottest new social networking tool, but it can be dense and confusing to the uninitiated. Successful users are finding that Twitter can deliver a gusher of value, from market intelligence to sales leads, but unlocking that value requires understanding the unique characteristics and culture of the Twitter community.
This webinar looks at the dynamics of Twitter and how to apply it to your business. You'll learn:
Who should “tweet” for your company;
How to create a unique and compelling Twitter presence;
How to grow a quality follower base;
The value of retweets and hash tags;
How to express yourself in 140 characters; and
The low-hanging fruit of business value.
#digitalactivism: networks, new media and political actionJake Wallis
Presentation at the the University of Canberra's News and Media Research Centre on my research into online political communication, influence and mobilisation.
This is PowerPoint presentation inspired by Garr Reynolds on helpful slide tips when creating presentations. Some of these tips consists of things such as fonts and the appropriate themes.
Diretor da Social Return on Investment (SROI) Network, uma rede de pessoas, organizações e empresas empenhados na adoção de princípios e padrões de contabilização do valor social e ambiental. Dirige também a organização FairPensions e o FRC Group (um negócio social sediado em Liverpool). Preside à Social Impact Analysts Association e é membro do comité consultivo do IRIS, um centro de recursos sobre medição de impacto social. Eis a sua intervenção na Conferência Impacto Social 2013 de dia 24 de Junho em Lisboa.
A presentation about Twitter and how it can be used for PR, communications and marketing. Presented internally for my Weber Shandwick colleagues but applicable to an external audience also.
Curious if Twitter is right for your organization?
Accompanying podcast on website.
This presentation explains how to market your organization on this free, fast-growing social media site. I go in-depth so you can learn practical Twitter skills such as understanding hashtags, lists and retweeting, managing your tweets so Twitter doesn’t manage you, the dreaded ‘Fail Whale’, and knowing how to attract followers and interact effectively with them.
This presentation was delivered on April 13th to the Charleston County Library's Small Business and Not-For-Profit Networking Luncheon.
This presentation focuses on the way public libraries in South Africa can use various social media tools to promote their library and the services it offers.
I give talks, provide training and work one-on-one with business owners, executives and staff to teach how to use Facebook, Twitter, LinkedIn, Google+ and blogging for business. This slide set is from my Aptos Chamber of Commerce talk, "Twitter for Business," Feb. 9.
Webinar by @LasaICT and @Watfordgap on 11 November 2014. Top tips to help charities and non-profits make better use of social media
Watch the webinar at: https://vimeo.com/112268090
An introduction to social media marketing for businessAnn Stanley
• Getting started with social media and resources required. We also look at defining objectives.
• Planning and setup of accounts, profiles and tools
• The importance of a content marketing strategy; what will you talk about?
• Platforms and techniques
• Making the job easier with tools and automation
• Measuring and monitoring site traffic, campaign performance, reputation management etc.
• Create an integrated strategy which combines social media and other digital marketing activities
Using Twitter as a Postgraduate ResearcherSimon Bishop
Second version of my talk. I tried to make it more focused and a better introduction. As ever, cute pictures need no explanation.
As for Up - try explaining the plot of it to someone who hasn't seen it... ridiculous, isn't it? There's no way to sell it that way, they have to see it. In the same way, to describe how Twitter works gives no indication as to its functionality. You have to play with it and learn by experience.
Top tips for getting the best results from social media - Jotul Dealer Event ...Rev Marketing
Our Director, Rosie Evans, delivered a brief social media training seminar at Jotul's Dealer event.
The presentation gave a brief overview of how social media can help your business and then went on to give some hints and tips on how to get the most out of your social media activities.
The seminar mostly focused on Facebook and Twitter. It stresses the importance of measuring social media (and in fact any marketing) and looks at tools like Hootsuite and Sumall.
Got a question about this presentation? Drop us an email: evolve@revmarketing.co.uk or call us on 02476 610 054.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
4. • It‟s a real-time text-based
– Limits messages to
– (160 for SMS, minus 20 for
user names)
social
networking service on the
Web today
– Nearly users
• ABC - Nightline 8 Minute
Story - 2009
– Relevance, use, impact
– http://www.youtube.com/watch?v=nfnoWk3x2RU
&eurl=http://laughingsquid.com/twitter-on-abc-
news-nightline-charlie-rose/
5. • Question : “ ?”
“ ”
• In the average was tweets per day.
• In that had grown to .
• In tweets per day averaged .
• In that number was tweets per day.
• In the month of alone, tweets are being sent on
average per day.
• As of , users on Twitter are now averaging Tweets
per day
http://www.marketinggum.com/twitter-statistics-2011-updated-stats/
10. • Women follow more people on Twitter & post more tweets compared to
men http://bit.ly/o90uyT
• An average of new Twitter accounts are created every day http://bit.ly/o90uyT
yrs, mths & day from the to .
• In , now sent http://bit.ly/o90uyT
• Thanks Charlie Sheen: #tigerblood was the „pop culture‟ trending
topic for the 1st half of 2011 http://bit.ly/o90uyT
of active users on Twitter use their to tweet http://bit.ly/o90uyT
http://www.marketinggum.com/twitter-statistics-2011-updated-stats/
11. • Current record is set 4 secs after midnight in Japan on
New Year‟s http://bit.ly/o90uyT
and are the most active days on Twitter (16% of tweet
volume each) http://bit.ly/o90uyT
• Twitter ranks in the http://bit.ly/o90uyT
• The was sent by Twitter creator Jack Dorsey
@Jack http://bit.ly/o90uyT
http://www.marketinggum.com/twitter-statistics-2011-updated-stats/
12. • The in 2006 called
Twitter “
”
• A Giblin/Gannon/Dong study found
that most Twitter users rank “ ”
as their on the service
• The has become so
important that Microsoft (Bing) and
Google now pay Twitter
each year so they can
instantly “ ” messages for their
searches
• The is now
every Twitter message to
document “ ”
13. • The Giblin/Gannon/Dong study found significant
between and users
– More oriented toward news and information
– less interested in socializing
– more interested in socializing than news and
information.
• This probably means that are
for Facebook and Twitter
14. • Conversations Occur or
Consent
– Better to be where you‟re being
discussed
– http://search.twitter.com/
• Several stand-alone programs
allow you to
– Hootsuite :
http://hootsuite.com/dashboard#/ta
bs?id=1088385
15. • Not is going to use
Twitter
channels of
– For students, alumni, faculty and
staff, businesses, and consumers
, and way to reach
core audience
– Twitter users want
– Probably more interested in the l
at Pacific than
Facebook users
16. attracted the
of just about every
television, radio and newspaper
in the Central Valley
– We have pitched
numerous stories over Twitter
• Pacific‟s
Is
linked with Twitter
– If something big happens here,
we already know that many
to find out
exactly what‟s happening
17.
18.
19. – to send a message
– (rt @UOPacific)
– repeat someone else‟s messages
–
(d @UOPacific)
– only delivered to one user
– It can be retweeted by that
user, so don‟t assume it
will always stay secret
– Used to shorten URLs for posting links
20. - (#pacific)
– Makes that word more searchable
– Allows non-followers to quickly find
related messages.
– Groups messages together so large
numbers of people can see all related
messages on a topic
– (#ff)
– Some people send out the names of
their favorite Tweeters every Friday
– Also shows up as #followfriday
– (#musicmonday)
– Mondays when people share their
favorite music
– These also can be #mzk, #nowplaying
and #music
– Picture stored on Twitter‟s servers, sent through Twitter
– Very popular, especially with cell phone Tweeters
21. – A or of words
being by a large
number of Tweeters at
any given
– http://www.twitscoop.com/
– http://tweetstats.com/trends
– http://tweetstats.com/graphs/uopacific
22. • Accounts are
– Pick a that
best who you are
– Select an that let‟s
people know who you are
• Pacific
- combination
of UOP and Pacific
– There are
at Pacific:
– http://www.pacific.edu/x24
197.xml
23. • Start following or
for topics or that interest you
recommendations by
who are following
24. to describe
yourself
– Keep it
• Department Accounts
– Consider your department
Web page as your official URL
• Don‟t “ ” your tweets
– Use developed
– Users, especially students value
clarity and
• Telephone Tweets
– You can have sent to
your
• You can set the
• Ie. Between certain , or
only messages
25. Twitter to Your Accounts
– Facebook, Friendfeed and other social media (#fb)
http://www.facebook.com/selectivetwitter
– “feedburner” on your blog Tweets new entries
26. • You can go to and do it
• Twitter also offers it‟s own standalone programs
for the and
• Popular programs
.
– List of the most popular:
http://techcrunch.com/2009/02/19/
the-top-21-twitter-clients-
according-to-twitstat/
27. • Each message is a “ ”
to capture follower‟s attention
• Don‟t be afraid to “ ”
other‟s messages
– Makes you a
if it‟s
• Twitter shortens
before sending
– Try to to
where the link sends them.
28. • Don‟t post e stuff
– Will cause your followers to eventually
.
• Instead, post/link to stuff that is
or has captured your
• Don‟t yourself
subject matter
– Growing Trend in a Call for and
• Twitter is a
– Don‟t be afraid to to jump
start that conversation
29. • Don‟t overtweet
– Average 5-10/day
• Don‟t be too guarded
– People want to get to know you
– Let them, provide insight
• Don‟t delay responses
– Check account often and reply
ASAP
• Please Tweet Responsibly
– http://www.tweetresponsibly.net/
30. • The can see
your Tweets
your Tweet out
loud before pushing the
“ ” button.
• Don‟t
– If you retweet someone‟s
comment, give them
!
31. • Some accounts will send
– “Take Vaxadril”
– “Learn how to increase your followers
on Twitter.”
post or retweet those.
– Some of those accounts have been
– Sending out those types of messages will
make it like you have been hacked
• People don‟t want pure
“ .”
– We may be doing this for marketing
reasons, but we want to look
, not like an advertisement.
32. • On all social media there is a
of the people are “ ”
• meaning they only watch feeds
and rarely comment.
do
responsible for more
than 90 percent of messages
• This is on Twitter
of the users are responsible
for of the messages
:
33. on Twitter
y follow everyone who follows you
as a courtesy
– Only follow people who have interesting feeds
– Mostly follows local news agencies, local
Stockton organizations, educational services,
other universities and on-campus personalities
– Makes it easier to find retweetable information
that better serves our followers
– May creep out the students if Pacific started
reading every tweet they sent
generally
34. • This is “social” media
– We do want to be careful
of what we write
– We don’t want the language
to be cold and unforgiving
– Let your followers know that
there is an actual human being
writing the messages.
• Don’t be afraid to sometimes post something goofy
– A photo of the staff or a co-worker‟s toys on a desk
– Comment on something that just happened
• Like a breaking news story
• This will make your feed seem more honest and genuine
and will gain you a lot of respect from your followers.
35. • Patrick Giblin
– Media Relations Manager, University of the Pacific
– Thesis: Social Media‟s Impact on Higher Education‟s
Crisis Communication Plans
– @inkyhack
• @UOPacific
• Ashley Hale
– Marketing Intern, Marketing and University
Communications
– B.S. Marketing, Class of 2012