Twitter Presentation
-
Upload
scriptalias -
Category
Technology
-
view
125 -
download
1
Transcript of Twitter Presentation
State of Social MediaState of Social Media
04/18/23 1
IntroductionIntroduction
❖ What Is It?❖ What Can You Do With It?❖ Where Did It Begin?❖ Who Uses It? ❖ Privacy and Security❖ Where Will It Go?
04/18/23 2
What Is It?What Is It?
04/18/23 3
❖ Free social networking and micro-blogging service
❖ “Twitter is nothing but a blank box into which you type up to 140 characters. You then hit a button and those characters feed out to anyone who wants to receive them.” – Rex Hammock
What Is It?What Is It?
04/18/23 4
What Can You Do With It?What Can You Do With It?
04/18/23 5
❖ You set up an account with an email address and password.
❖ User’s can send “tweets” that are up to 140 text based characters in length
What Can You Do With It?What Can You Do With It?
❖ Tweets are broadcast in reverse chronological order to twitter.com and to individuals know as Followers.
❖ You can also subscribe to someone else’s tweets at which point you are referred to as Following.
04/18/23 6
What Can You Do With It?What Can You Do With It?
04/18/23 7
Where Did It Begin?Where Did It Begin?
❖ Created in 2006 by Jack Dorsey
❖ About US$57 million of Twitter is owned by venture capitalists
❖ Took off at SXSW in Austin Texas that year at the Film & Interactive (my link to nerd fame – I was there)
04/18/23 8
Who Uses It?Who Uses It?
❖ Geeks looking for a digital sandbox for ideas?
❖ Not anymore…
❖ Went mainstream with Oprah the second week of April 2009.
04/18/23 9
Who Uses It?Who Uses It?
❖ Forrester Research estimated that Twitter had 4.5 million users and 55,000,000 monthly visits!
❖ In order of popularity:
04/18/23 10
Who Uses It?Who Uses It?
❖ Nielson.com estimated that Twitter grew by 1382% in 2008 while Facebook saw a growth rate of 228%
❖ I use it (sparingly)
04/18/23 11
Who Uses It?Who Uses It?
04/18/23 12
Privacy and SecurityPrivacy and Security
❖ Twitter collects personally identifiable information about all it’s users through it’s registration and messaging services.
It considers this information to be an asset and shares it with third parties.
❖ So did I receive a bunch of coupons for diapers? Unfortunately not!
04/18/23 13
Privacy and SecurityPrivacy and Security
❖ Twitter was hacked in January of 2009 using a brute force dictionary attack on a administrator’s account.
Outgoing messages were falsified and included sexually explicit and drug-related messages.
04/18/23 14
Where Will It Go?Where Will It Go?
❖ API – Application Programming Interfaces
❖ Ultraportable Devices: iPhone and Blackberry
04/18/23 15
Where Will It Go?Where Will It Go?
❖ Embedded in websites: education, government, corporate, personal
❖ The Los Angeles Fire Department put the technology to use during the October 2007 California wildfires
❖ Israeli government used Twitter – Hamas/Gaza
❖ CNN uses Twitter for their Breaking News program.
04/18/23 16
IntroductionIntroduction
04/18/23 17