When it comes to social media services, Twitter is now up there in popularity with Facebook, blogs, Digg and YouTube. A microblogging service that wants you to provide the answer to "What are you doing?" in 140 characters or less is used to post links to pages and Web content they like, to randomly update friends' on what's new, and also to market their own products and services via online tweets.
When you create your Twitter account, the site offers a basic update form box where you can send out your tweets. Outside of using Twitter's own Web interface, there are a number of applications clients, tools add-ons and helpers you can download to make tweeting a better, faster process. To help you sort out the best options for tweaking your Tweeter tactics, we take a look at several cool and useful Twitter tools including URL shrinks, Twitter clients and Twitter Web widgets to get you started.
Shrink That URL
One of the most important tools used by Twitterers are URL shrinkers online services that will take a long URL you want to include in your Tweet and shrink it down. Technically speaking, these Web services provide short aliases for redirecting long URLs, however URL shrink is the more common description to use.
So, why would you need to redirect a URL? Remember that tweets are limited to 140 characters and you really don't want to waste that space with a long URL. That is why tweeple love URL shrinkers. You can toss out a URL and still have character space to describe what is on that Web page.
|Do you have a comment or question about this article or other e-commerce topics in general? Speak out in the SmallBusinessComputing.com E-Commerce Forum. Join the discussion today!|
BEST PRACTICE WEBINAR: Critical Requirements for Building a Future-Ready Contact Center Wednesday, October 29, 2014 2 PM Eastern / 11 AM Pacific Today, customers expect the agent who answers their call to know they've already sent an...
Putting Mobile First: Best Practices of Mobile Technology Leaders Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the...
IT Can Be Done: How to Protect Enterprise Data Yet Enable Secure Access for End Users On-Demand Let's face it. Today's enterprise IT is faced with new challenges due to the proliferation of personal devices in the workplace and the...
EMA: The Evolution of Data-Driven Security Information is data with context. The era of Big Data has begun demonstrating to information security that there is more that can, and must, be...