Posts Tagged Twitter
Our new best friend Miguel The Driver dropped us off front and center as event greeters hastily opened the doors of our black limo-esque Denali SUV and welcomed us onto the red carpet. Met by a barrage of camera flashes, the masses soon realized we were nobody of note and they turned their attention on to the next car. One quick picture with the Official CBS Photographer and my girlfriend, her sister and boyfriend, and their mom and I made our way down the lengths of paparazzi and E! Reporters.
Where was I? Oh the Grammy’s (he said casually, like this happens every weekend..)
So how did I end up at the Grammy’s? I guess I should really start with that.
My girlfriend’s mom happens to work for CBS and is “required” to go to both the #Grammys and the #Emmys every year, and this year I was lucky enough to get included in the invitation! Not that the whole red carpet/celebrity scene is my forte, but you’ve got to be excited about an invite like that. I pressed my new black suit and grey tie, and found myself back in Los Angeles where I spent 4 years at @UCLA
After being hurried along down the carpet as another face in the crowd, we found a few undisturbed seconds to take a couple pictures of our own at one of the classic Grammy signs. We made it through the down to Section 101, Row 2, Seats 1-5, and #instagram made its first appearance of my night as I snapped a picture of the stage and pushed it to twitter. One of my favorite parts of the night, we watched as the people of VIP-enough status to sit on the court floor filed in with their friends. Some of my favorite artists/stars of note were @TheBlackKeys, @TheLumineers, Fun. (@Ournameisfun), @Frank_Ocean, @Jtimberlake and @LenaDunham just to name a few.Naturally, celebrity hype and ‘fashion, fashion, fashion’ were central themes of night, but social media came in a close second. As you home viewers know from his opening speech, @LLCoolJ made sure to encourage everyone at home to tweet away with the hashtag “#Grammys” and mention him @LLCoolJ, noting that the Grammys in 2012 were the largest social media event to date and they hoped to break records again. What you didn’t see behind the scenes were the several other reminders to the live audience to post from the arena.
With such a large emphasis on social, I constantly checked twitter and posted (or tried to post) during my favorite performances trying to catch LL’s attention and be one of the random tweets read just after several commercial breaks throughout the night. My limiting factor was actually the data network in the arena. With everyone trying to tweet away, check in on foursquare, and post on their friends’ wall saying Justin Timberlake just walked by, it was hard to even get a post out.
Overall, seeing some of my favorite musicians sitting just rows away and braving the blinding flashes made for quite the night. Although I couldn’t do it every night (let’s say 20 performances was…stimulating), I would love to go back again for another 3-day music festival packed into one night.
Follow the exciting life of #TeamActiance on Twitter for the latest team adventures and experiences.
This week representatives from Team Actiance have descended on Orlando, Florida to participate in Lotusphere- IBM Connect 2013, including Kailash Ambwani, Sarah Carter, and Cinthia Shields. Although I am not at the conference myself, I have had the privilege of experiencing it vicariously through them and their activities through their tweets and the IBM connect hash tag #IBMConnect. By monitoring the collective tweets of participants, I’ve been able to experience the sessions, parties, speakers and conversations that have been taking place. (Although, enjoying a drink via Twitter is not the same experience).
This certainly isn’t the first time that I’ve used hash tags to experience events from afar. For the past three years I’ve lived vicariously through the participants tweeting from the South by Southwest conference in Austin. This year I finally get to participate in person and will be using hash tag #SXSW to share my observations and experience of the events surrounding the conference. Since I have not been able to attend SXSW in person before, I feel a certain responsibility in sharing with those outside of the event who will be living the event vicariously through me and others- much like I have in years past.
For speakers and attendees the use of a conference hash tag serves additional purposes. For one they allow them to communicate their own thoughts and feelings of the conference in real time, and monitor how people are reacting and experiencing the event. Speakers and organizers also have the added benefit of having scribes in the audience that are eager to amplify the conversations and messages that are being shared by conference attendees to a much larger and wider audience that is monitoring the event online. As a result, speakers that are presenting on specific subject matter to room of attendees can easily multiply the number of listeners and participants by the viral sharing of information to every connection or follower that a person has in the audience through twitter. As a speaker I am never dissuaded or insulted when I see folks Tweeting away the information I am sharing. If the idea is to share information and ideas, then getting the message beyond the walls of the event only increases the number of people who receive the message. It may also serve the purpose of increasing my own fan base and opportunities for new connections. 100 people in the room tweeting to 100 followers adds up quickly, do the math.
To encourage participation, conference organizers are aware of the importance of displaying and promoting the hash tag of the event to attendees as it is happening. At the Janney Montgomery Scott Elite FA Conference in Philadelphia earlier this month, the conference experimented with a Twitter wall in their Genius Lounge that was displaying tweets using the #Elite13 hash tag. Having the hash tag and accompanying tweets scroll in plain view of conference participants provided an additional incentive to participate- and likely drove social behavior. I think everyone likes to see their name in lights- even on a Twitter wall at a conference. People would actually stand in front of the wall and tweet, waiting for it to display on the screen in front of them.
To find out what the most current and trending topics are in the country or specific geographic region you can go directly to twitter and look at trending topics to see what conversations are currently taking place. In addition there are a number of different tools online that will provide you a glimpse of the most popular hash tags that are available. Trendsmap allows you to see local trending hashtags on a map of the country that allows you to zoom in on specific regions and cities. It’s fun to look at too. Another site which is fun is Twubs that serves as a directory of popular hashtags. Participants can plug in multiple hash tags and participate in the conversations. Finally, my favorite hash tag tool is TweetChat. By logging into TweetChat using my Twitter credentials, I can participate in any conversation by adding the hash tag and then following along. The bonus, is that any tweet, or re-tweet from the site will automatically add the hash tag to the post.
Additional validation for the power of hash tags has been validated by their use by networks to promote televisions shows and sporting events. These days a hash tag can easily be found as a program begins or is mentioned as part of the broadcast. Network programmers and marketers know that with the proliferation of smart phones and tablets, the idea of entertainment being digested via two screens is becoming more prevalent. I myself have begun to experience this more and more and the act of watching television has become less passive and more active as I participate in the conversations surrounding the unfolding events on TV. This was especially true with sporting events, and we in the Bay Area have been lucky with the performance of our San Francisco Giants, and now the Superbowl bound 49ers. I anticipate that this year’s Super Bowl in New Orleans will set a new record of online participation via tweets around the events of the game.
So although I’m not participating at the IBM Connect 2013 in person this year, Team Actiance is on the scene using hashtag #IBMConnect and sharing with us the people they are meeting, the events they are attending, and more importantly the things they are learning that help us all.
At the recent FS Forum seminar on “Will your social media strategy get you fired?” one of the overwhelming themes from the audience was how to get sponsorship from senior management who have two questions upper most in their minds – “what’s the benefit?” and “what’s the risk?”
One of the key benefits of social is engaging with an audience that doesn’t regularly use traditional communications methods. Look at your target demographics. If it’s under 34 and you’re not on social, you’re not talking to your prospects and customers. In the UK for example, the largest and fastest growing age group on Facebook is 25-34 with nearly 9 million users, followed by 18-24 years olds (source Socialbakers). As most of them grew up using text and instant messaging not email, social is just another communication tool.
If you’re not talking to your audience, your competitors soon will be. Whilst a survey from Assetinum earlier in the year found that only half of the top 50 private banks actively replied to tweets despite nearly all of them having a Twitter account, it is not a trend likely to continue. Particularly as it starts to dawn just how much additional engagement Visa gained with its Olympic social media campaign.
Depending on how you deploy social media usage, engaging with customers leads to an increase in revenue, reduces contact centre calls and potentially lowers customer acquisition costs. Some organisations have even found it useful as a general employee communication tool in times where other methods are too slow. During the London riots, BNP Paribas used it to help staff move safely around the capital.
The benefits aren’t just related to increased sales and improved customer service either. Over time, engaging directly with your customers, prospects and even your aggressors provides the type of in-depth data that can be used to enhance and develop future products and services.
The risks for any organisation engaging in social media shouldn’t be ignored, but neither should it be an inhibitor. Letting staff “loose” on social media doesn’t mean giving up an organisation’s hard won reputation or its squeaky clean compliance record. Understand the threat landscape from data leakage, malware and user behaviour and how it fits into compliance concerns is key to mitigating the risk. Once you have a better understanding about the risks, it’s easier to see the steps required to ensure your organisation remains safe.
But as my colleague Victor Gaxiola says – it’s not “why’ we should be using social senior management need to ask, it’s how.
If you aren’t listening to your customers, how do you plan to engage?
During a recent visit to Chicago I had the pleasant experience of engaging with a brand that is effectively using social listening to increase brand equity and in turn brand loyalty. In two tweets, they not only made me feel welcomed, they also provided me an example of how a brand can leverage a social tool to and share this experience with others- likely their long term motive.
After a heavy meal at one of our favorite restaurants, we decided to visit the Peninsula Hotel for an evening drink to finish the night. As a regular user of foursquare I checked in on my arrival to the lounge. Within seconds of my check-in I received a tweet welcome from the Peninsula Chicago (@ThePenisulaChi) that included an open ended question inviting me to a conversation. The entire exchange is below:
I proceeded to answer the question, and instead of being sold a product or service I was thanked for including the Peninsula Hotel as part of my Chicago experience.
What stood out to me about this exchange was the following:
1. The Peninsula Hotel is listening and engaging with people who check-in using foursquare, leveraging the location sharing application.
2. I felt welcomed and thanked for the visit.
3. In two tweets they have differentiated themselves from every other business that I check-in to that does not acknowledge my presence at all.
From a brand equity standpoint, I left feeling better about my experience at the hotel and was quick to share my exchange with my entire party and am writing about it now, which is yet another boost to their brand. All from two tweets!
Social listening does not mean that you have to give anything away but at the very least acknowledge your audience, especially when they are providing you with the information about their location and interactions with your people or your brand. It also provides you insight about who your customers are and how the engage with your people and products. How would knowing this differentiate you from your competitors?
There are hundreds, maybe thousands of places to get a drink in Chicago that I could choose to visit, however, during my next visit I will likely go back to the Peninsula. All from 2 tweets!
Today’s post comes from Norv Leong, Director of Product Marketing at Actiance.
As social software becomes entrenched on the enterprise scene, now would be a good time to put to rest some common misperceptions and myths that have hung ominously over the space. The Jive IPO and Microsoft’s acquisition of Yammer speak to the validation and adoption of social software as a viable means to enhance productivity and foster engagement.
So, with that as a backdrop, let’s take a look at some common misperceptions and see how we can’t allay these concerns:
Myth #1: Social software isn’t subject to regulatory guidelines
Social media and social software may be new forms of communication, but that doesn’t mean they shouldn’t be logged and archived for regulatory compliance purposes. In the eyes of the regulatory bodies (think SEC, FINRA, FERC, and similar), social software is just another form of electronic communication to be treated no differently than email. That means that content posted to social software platforms needs to be supervised, logged, and archived to ensure compliance with applicable recordkeeping and monitoring provisions. Since social software greatly facilitates collaboration, it’s very easy for individuals to bounce ideas (sometimes sensitive or unauthorized information) off each other and exchange files. That’s why the regulators are interested.
Myth #2: No one cares about social software eDiscovery
Anyone who’s lived in the US for any length of time will quickly and vigorously nod their head when asked, “Do you think the US is a litigious society?” That’s like asking the Pope if he’s religious. People do care about social software eDiscovery, and over the last few years, we’ve begun to see several cases emerge involving social. Lester v Allied and Crispin v Audigier come to mind as particularly relevant cases involving social media eDiscovery.
In fact, Duke University conducted a comprehensive study and found that the number of eDiscovery cases jumped from 7 in 2003 to 111 in 2009. The study cited that the #1 reason for courts issuing sanctions was a failure to produce electronic evidence (social software included). And, like litigation in general, there seems to be no end in sight.
Myth #3: Corporate governance has nothing to do with social software
Au contraire. Social software has everything to do with corporate governance, especially in an era where news travels lightning fast via social channels. You needn’t look further than the Arab Spring to see the speed and power of social in action.
Good corporate governance entails having the appropriate policies and procedures in place for records retention, information governance, and conflict management. It’s wide-ranging with the objective of instilling a sense of accountability throughout the company. And this includes social software communications. People use social software to brainstorm, debate, and even vent. Say or write the wrong thing, and all of a sudden, it becomes a corporate governance issue.
Myth #4: Plain ol’ capture is sufficient
Well, not exactly. Following on from the discussion above, responding in a timely fashion to discovery requests sounds easy but comes with some challenges. When you think about the volume of data floating around out there (emails, social software content, Facebook posts, Skype IMs, etc.), you’ll get a headache right quick. Those headaches are compounded by the manner in which this content is logged and archived.
Many of today’s archiving systems just capture the content without regard to context. We all know that people like to respond to blogs or other posts on social media. When you’ve got a couple dozen people chiming in with their thoughts, feedback, even deleted comments, it’s easy to see the importance of capturing conversations in context. There are just too many regulatory, legal, and corporate governance issues at stake to risk a substantial sanction or fine.
Off my soapbox now…
So there you have it – this author’s version of Mythbusters. Like with most things social, it’s all quite fluid and dynamic. What I just wrote today may be old hat tomorrow. But, given that old-school concepts such as law and compliance still hold valid today, I gotta believe that the myths debunked above has some legs.
What kinds of myths are you seeing in your enterprise?
Today’s post comes from Norv Leong, Director of Product Marketing at Actiance.
No, I’m not talking about one of America’s most beloved (or perhaps ridiculed) canned foods, but rather, the elimination of about half of the world’s electronic spam recently, thanks to a coordinated effort from several ISPs spread across the globe. Their efforts wiped out and crippled the Grum and Lethic botnets, respectively, which together accounted for about half of the world’s spam. Let that sink in for a moment.
Everybody that has ever touched a computer has likely received some kind of spam in their email inbox. It’s annoying and never seems to go away. Just goes to show that there will always be evil lurking in cyberspace. I’m talking about folks who are solely focused on wreaking havoc, stealing passwords, launching denial of service attacks, or hacking into computer networks of some of the most secretive agencies in the world. Whether they do it for fun, cuz they’re bored, or on someone’s payroll, I do not know.
The bottom line is that all individuals and companies have to be on their guard and not underestimate the importance of having the proper security measures, settings, and policies in place to combat the evildoers out there. Nowadays, the wildfire proliferation of social media and other Web 2.0 sites has proved to be prime hunting ground for spammers (check out a blog entry we did earlier on this topic).
Passing along malware is no longer the domain of email; it’s now spread to sites like Facebook, Twitter, and Skype. One thing that’s different about these sites (vis-à-vis email) is that they require a connection, friendship, or link to be established before you can receive content. That wasn’t the case with email. For instance, if Stevie were to receive a link from his buddy, Timmay, via Skype, Steve’s probably gonna click on that link since he trusts Timmay. That link might not in fact be from Timmay, but rather, from some spammer in Estonia.
So, it’s all well and good that the amount of spam has been cut down for now. But, like Wile E. Coyote’s lifelong pursuit of the Road Runner, I’ll bet a bomb shelter’s worth of Spam that hackers will continue to think up elaborate malware schemes that will make the Grum and Lethic botnets look like starter kits.
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- October 2010
- September 2010
- August 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- July 2009
- June 2009
- April 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- Application Filtering
- Electronically Stored Information (ESI)
- Employee Behavior
- Enterprise 2.0
- Enterprise IM
- Financial Services
- Guest Post
- New Internet
- personal v professional
- Product Announcements
- Public IM
- Retail banking
- RSA Conference
- Securities and Exchange Commission
- Social Networking
- Unified Communications
- Web 2.0
- Web Security