SlideShare une entreprise Scribd logo
1  sur  7
 
What is Twitter? ,[object Object],[object Object]
What does it do? ,[object Object]
Is it simple? ,[object Object],[object Object],[object Object]
Issues? ,[object Object],[object Object]
Good for anything? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank-you.

Contenu connexe

Tendances

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
What is social media
What is social mediaWhat is social media
What is social mediatessausman
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Beyond The Fail Whale: Twitter For Lawyers
Beyond The Fail Whale: Twitter For LawyersBeyond The Fail Whale: Twitter For Lawyers
Beyond The Fail Whale: Twitter For LawyersKathy Gill
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Social Media: Is It For Me?
Social Media: Is It For Me? Social Media: Is It For Me?
Social Media: Is It For Me? Alec Biedrzycki
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Bex Lewis
 
Year 11 gen_st_source_2
Year 11 gen_st_source_2Year 11 gen_st_source_2
Year 11 gen_st_source_2cliftonschool
 
Webinar: Safer on the Net using social media with digital awareness for #esk...
Webinar: Safer on the Net using social media with digital awareness for  #esk...Webinar: Safer on the Net using social media with digital awareness for  #esk...
Webinar: Safer on the Net using social media with digital awareness for #esk...Emma Pietrafesa
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the WebMiles Berry
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
twitterinclassroom
twitterinclassroomtwitterinclassroom
twitterinclassroomAndi Rosario
 
What do Data Visualisations want?
What do Data Visualisations want?What do Data Visualisations want?
What do Data Visualisations want?Farida Vis
 
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON THE HISTORY OF THE INTERNET
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON  THE HISTORY OF THE INTERNETCOMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON  THE HISTORY OF THE INTERNET
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON THE HISTORY OF THE INTERNETLauren Bradshaw
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 

Tendances (18)

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
What is social media
What is social mediaWhat is social media
What is social media
 
Twitter tweet presentation_2011
Twitter tweet presentation_2011Twitter tweet presentation_2011
Twitter tweet presentation_2011
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Beyond The Fail Whale: Twitter For Lawyers
Beyond The Fail Whale: Twitter For LawyersBeyond The Fail Whale: Twitter For Lawyers
Beyond The Fail Whale: Twitter For Lawyers
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Social Media: Is It For Me?
Social Media: Is It For Me? Social Media: Is It For Me?
Social Media: Is It For Me?
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010
 
Year 11 gen_st_source_2
Year 11 gen_st_source_2Year 11 gen_st_source_2
Year 11 gen_st_source_2
 
Webinar: Safer on the Net using social media with digital awareness for #esk...
Webinar: Safer on the Net using social media with digital awareness for  #esk...Webinar: Safer on the Net using social media with digital awareness for  #esk...
Webinar: Safer on the Net using social media with digital awareness for #esk...
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
 
Studio Crossings
Studio Crossings Studio Crossings
Studio Crossings
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
twitterinclassroom
twitterinclassroomtwitterinclassroom
twitterinclassroom
 
What do Data Visualisations want?
What do Data Visualisations want?What do Data Visualisations want?
What do Data Visualisations want?
 
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON THE HISTORY OF THE INTERNET
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON  THE HISTORY OF THE INTERNETCOMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON  THE HISTORY OF THE INTERNET
COMPLETE GUIDE ON WRITING A PROFICIENT ESSAY ON THE HISTORY OF THE INTERNET
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 

Similaire à Web 2.0 - Twitter

Digital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media MonitoringDigital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media Monitoringpropertynews.com
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
SOCIAL MEDIA.docx
SOCIAL MEDIA.docxSOCIAL MEDIA.docx
SOCIAL MEDIA.docxZain681419
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentationguest09025b
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Twitter Usage at Conferences
Twitter Usage at ConferencesTwitter Usage at Conferences
Twitter Usage at ConferencesRam Parthasarathy
 
Navca Twitter
Navca TwitterNavca Twitter
Navca TwitterLasa UK
 
UK Networked Nonprofit
UK Networked NonprofitUK Networked Nonprofit
UK Networked NonprofitBeth Kanter
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Badmanesh Makheja
 
Twitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingTwitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingLasa UK
 
Social Networking Informative Speech
Social Networking Informative SpeechSocial Networking Informative Speech
Social Networking Informative SpeechCory Bohon
 
Art Of Social Media Marketing
Art Of Social Media MarketingArt Of Social Media Marketing
Art Of Social Media MarketingStephen Nold
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurFarida Vis
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 

Similaire à Web 2.0 - Twitter (20)

Twitter
TwitterTwitter
Twitter
 
Twitter
TwitterTwitter
Twitter
 
Twitter
TwitterTwitter
Twitter
 
Digital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media MonitoringDigital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media Monitoring
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social Networking As A Tool For Learning
Social Networking As A Tool For  LearningSocial Networking As A Tool For  Learning
Social Networking As A Tool For Learning
 
SOCIAL MEDIA.docx
SOCIAL MEDIA.docxSOCIAL MEDIA.docx
SOCIAL MEDIA.docx
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Twitter Usage at Conferences
Twitter Usage at ConferencesTwitter Usage at Conferences
Twitter Usage at Conferences
 
Navca Twitter
Navca TwitterNavca Twitter
Navca Twitter
 
UK Networked Nonprofit
UK Networked NonprofitUK Networked Nonprofit
UK Networked Nonprofit
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
Twitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingTwitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh Thinking
 
Social Networking Informative Speech
Social Networking Informative SpeechSocial Networking Informative Speech
Social Networking Informative Speech
 
Art Of Social Media Marketing
Art Of Social Media MarketingArt Of Social Media Marketing
Art Of Social Media Marketing
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occur
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Web 2.0 - Twitter