I have noticed that whereas someone would normally search for their friends on twitter for purpose of following them, it is also possible to use twitter as a marketing tool and a community building tool. So, for example, if I had a service that might be of interest to web designers, for example, then my twitter profile message could be worded to describe that service. Then, I could search for twitter participants whose profile description included the words "web designer" or "web design" and then "follow" them. Each of those people would then be notified by twitter that I was following them, and they would be given a link that they could click on to learn about my twitter account. Upon reading my twitter profile they might choose to click on my own website link from within my twitter profile to learn more about me and my service. Moreover, they might choose to follow me in order to receive my twitter postings, which may be on subjects that they would find interesting. I noticed other people doing this sort of thing, so I tried it myself in relation to my music-related website. If you follow me on twitter (http://www.twitter.com/jdargan), then you can see how I post information that is of interest to musicians and people who love music and the music community.

Views: 69

Replies to This Discussion

Here are some more points about the twitter strategy. First, it is a quick way to reach people. Second, it is a free service. Third, you may find that you learn a lot from the people you "friend" on twitter, and they may actually become great friends of yours over time. Fourth, in your tweets you can periodically provide a link to some newly-added content on your website, and then if people are interested, then will be able to click on the link to see your blog, article, photo, video, etc., which will help boost traffic on your website. Lastly, if your link is too long for a "tweet", then you can use a service such as www.tinyurl.com to shorten it.
Another thought about the twitter strategy. I have noticed that experienced twitter users often direct messages to certain friends using the "@" symbol, such as "I am looking forward to collaborating with @jdargan tomorrow". So then you can look at the friend's twitter page and read their profile. Very often you will want to follow the friend as well, since the friend is a member of the same community of interest as the one you are trying to reach.

RSS

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Google’s TurboQuant Compression May Support Faster Inference, Same Accuracy on Less Capable Hardware

Google Research unveiled TurboQuant, a novel quantization algorithm that compresses large language models’ Key-Value caches by up to 6x. With 3.5-bit compression, near-zero accuracy loss, and no retraining needed, it allows developers to run massive context windows on significantly more modest hardware than previously required. Early community benchmarks confirm significant efficiency gains.

By Bruno Couriol

Presentation: Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.

By Celine Pypaert

Zendesk Says AI Makes Code Abundant, Shifting the Bottleneck to “Absorption Capacity”

Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.

By Eran Stiller

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service