I have noticed that whereas someone would normally search for their friends on twitter for purpose of following them, it is also possible to use twitter as a marketing tool and a community building tool. So, for example, if I had a service that might be of interest to web designers, for example, then my twitter profile message could be worded to describe that service. Then, I could search for twitter participants whose profile description included the words "web designer" or "web design" and then "follow" them. Each of those people would then be notified by twitter that I was following them, and they would be given a link that they could click on to learn about my twitter account. Upon reading my twitter profile they might choose to click on my own website link from within my twitter profile to learn more about me and my service. Moreover, they might choose to follow me in order to receive my twitter postings, which may be on subjects that they would find interesting. I noticed other people doing this sort of thing, so I tried it myself in relation to my music-related website. If you follow me on twitter (http://www.twitter.com/jdargan), then you can see how I post information that is of interest to musicians and people who love music and the music community.

Views: 76

Replies to This Discussion

Here are some more points about the twitter strategy. First, it is a quick way to reach people. Second, it is a free service. Third, you may find that you learn a lot from the people you "friend" on twitter, and they may actually become great friends of yours over time. Fourth, in your tweets you can periodically provide a link to some newly-added content on your website, and then if people are interested, then will be able to click on the link to see your blog, article, photo, video, etc., which will help boost traffic on your website. Lastly, if your link is too long for a "tweet", then you can use a service such as www.tinyurl.com to shorten it.
Another thought about the twitter strategy. I have noticed that experienced twitter users often direct messages to certain friends using the "@" symbol, such as "I am looking forward to collaborating with @jdargan tomorrow". So then you can look at the friend's twitter page and read their profile. Very often you will want to follow the friend as well, since the friend is a member of the same community of interest as the one you are trying to reach.

RSS

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Powering the Future: Building Your GenAI Infrastructure Stack

Merrin Kurian shares the architectural blueprints and organizational processes behind Intuit’s AI transformation. She explains the "fixed, flexible, free" framework used to scale GenOS across 8,000 developers, enabling 3,500+ production experiments. She discusses critical agent failure modes, the "LLM-as-a-judge" evaluation strategy, and how to build "tool-ready" APIs for the future.

By Merrin Kurian

TanStack Details Sophisticated npm Supply Chain Attack That Compromised 42 Packages

TanStack has released a detailed postmortem describing a sophisticated supply-chain attack that compromised 42 npm packages and published 84 malicious package versions in just six minutes, exposing developers and CI/CD systems to credential theft and malware propagation.

By Craig Risi

Article: Kernel-Level Ground Truth: Why eBPF is Replacing User-Space Agents for Security Observability

eBPF is emerging as a preferred method for security observability over traditional user-space agents. By attaching probes directly to the Linux kernel's syscall interface, it provides consistent visibility even during container-level compromises. eBPF reduces security-related CPU consumption and limits data volume by performing filtering at the kernel level, enhancing operational efficiency.

By Niranjan Sharma

Vite Version 8: Unified Rust-Based Bundler and Up to 30x Faster Builds

Vite 8.0 introduces a significant architectural change, migrating from a dual-bundler setup to a single Rust-based bundler called Rolldown. This update enhances build speeds, reporting reductions from 46 seconds to 6 seconds in some projects. The release includes developer experience improvements and maintains compatibility with the existing plugin ecosystem.

By Daniel Curtis

Swiggy Improves Search Autocomplete Using Real Time Machine Learning Ranking

Swiggy detailed real-time machine-learning ranking system for autocomplete built on OpenSearch. The architecture separates candidate generation and ranking, uses feature stores for real time signals, and applies learning to rank models for improved relevance. It replaces heuristic ranking while maintaining strict latency constraints and enabling continuous model updates from user behavior signals.

By Leela Kumili

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service