A personal search engine that keeps track of your social footprint for future reference? It’s here in Introspectr.com. Introspectr’s motto: “Stop searching, start finding. Introspectr makes it easy to find messages, documents, and links from every part of your online life.”
Provide Introspectr access to your Twitter, Facebook, and Gmail accounts
Introspectr indexes your Twitter, Facebook, and Gmail messages along with links and attachments
Search with any term and the results returned are your past Twitter tweets, Facebook messages, and or emails related to your search term(s)
Brian Clark the man behindCopyblogger.com one of the most compelling and successful blogs in the blogosphere is at it again. Brian is giving away a very compelling 28 page report “How to Create Compelling Content That Ranks Well In Search Engines.” This is a comprehensive report that is a fantastic how to first step in writing online content that will get indexed and ranked high in Google.
As Brian so succinctly states: “Put simply: If your content isn’t good enough to attract good, natural links, it doesn’t matter how “optimized” that content is. Here is your link and first step to copy “optimization.”
The best example of customer service and support, utilizing social networking in their efforts, is Comcast. More precisely it is the Digital Care team run by Frank Eliason that shines the brightest light on how American corporations could and should be engaging their consumers on a daily basis. The following are excerpts of the interview Frank gave to Mashable.com for the article “How to Use Twitter to Support Customers.”
Mashable: Exactly how do you use Twitter? Frank E: We use Twitter to help customers. We simply search for “Comcast” and a few variations and respond by offering help. Mashable: What Twitter tools do you use? Frank E: If you are thinking of listening, you can easily start with Google Blogsearch, Twitter Search, and Facebook Search. For analysis we use Radian 6 and Nielsen Online, but for day-to-day work we do use many free tools Mashable: How many cases do you deal with every day? Frank E: We review about 6,000 blog posts each day with most not having anything to do with Comcast. Twitter has about 1,500 – 2,000 tweets a day or more. . . We reach out to 600 – 1,000 people, and we have conversations with about 200 – 300 a day. Mashable: Do you use ghosts or staff or is it pure Frank? Frank E: Every tweet from @ComcastCares is me, but I am not out there as much as I used to be. When we started on Twitter I was out there all hours of the day and night, usually seven days a week. Today we have ten different Twitter ID’s. Different than many companies, I believe that each ID should represent a person. I relate this to calls. You would never answer a phone, “XYZ company. What do you want?” so we have team members with ID’s like @Comcastbill and @Comcastbonnie responding to our customers
Comcast’s Differentiating Factor: Come Out From Behind The Logo
In our opinion, the very simple strategy of naming each Twitter account, coming out from behind the logo to create a human experience, is the very essence of what has made Frank’s program so successful. It is Comcast’s differentiating factor and a strategy very few American corporations are willing to try.
Twitter’s Favorites section is a fantastic repository for you to save valuable research links, commentary from people you follow, proof that your efforts are working, or as a space to hold all relevant testimonials for your product or service. With all of this value that the Favorites section has to offer there is a dark side– a very dark side.
Beware of these Favorites Problems
Favorites can not be hidden or locked
Favorites can be accessed by the public like your tweets
Favorites can be mined and scrutinized by your competitors
Favorites can, if you favorite the “right” information, give your competition hints to your future plans
Favorites can showcase your prospects or current customers
Favorites can reveal the types of research you are examining
Until Twitter provides privacy or a locking option for your Favorites section, beware that what you place there can be used to evaluate your efforts.
One of the newest “practices” surfacing on Twitter is designed to make sure you follow a person or company that has followed you. Since this tactic does not have a name we are dubbing it the Follow-Unfollow-Follow tactic
Follow-Unfollow-Follow: How It Works
Follow: a twitterer that you are uninterested in following follows you
You Ignore: you do not follow this useless Twitterer and ignore them
Unfollow: the twitterer waits for 24-48 hours and once they realize you are not following them, they unfollow you
ReFollow: within the next 24 hours after their initial “unfollow” the twitterer will refollow you
What Is the Follow-Unfollow-ReFollow Strategy?
Everyone Follows: this tactic’s goal or strategy is to ensureevery single person that a twitterer follows will follow
Top of List: by refollowing a second time, the twitterer’s logo or face is at the top of your follower’s list
Pest: being a pest, the twitterer hopes to ware you down so that you follow them back just to get rid of them
Multiple DMs: each time the twitterer follows you he/she can direct message you, it will surely be spam, a sales pitch for whatever they want you to do for them
Martin Luther King, a doctor, a pastor, a leader, a man of passionate idealism and faith. Where ever you are in the world today, try to remember what once was- a man bridging the gap of social injustice while setting an example of non violent resistance. If words are the pillars to our actions, then Dr. King built a castle to freedom.
Blog writing is vastly different from “long” writing seen in newspapers and magazines. The idea behind blog writing is to capture a reader’s attention immediately, create succinct articles, and keep the word count under 500 words when possible.
5 Tips to Engage Online Readers
1. F Shape Theory: Jakob Nielsen, Time magazine’s King of Usability, formulated a theory describing online reading habits. Online readers, according to Nielsen, read the title first, then scan down the left side bar looking for keywords important to them. If the reader finds a keyword they scan left to right into the body of the text. If the reader does not find a keyword they scan down the left side bar and leave. The F Shape Theory
2. Bold: Utilize the Bold feature to help text stand out, pull the human readers eye to keywords and subheadings, and more readable for Google ‘bots
3. Bullets and Numbers: Online readers love bullet and numbered lists. Use these list articles as often as possible
4. Images: Pictures attract the eye and help hold the reader’s interest. Utilizing screenshots is a very effective method of teaching your readers when producing any how-to articles. Example below:
5. Video: This adds a higher level of engagement for the reader. Youtube.com is also a very prominent social network that can drive traffic to your site. Warning: videos should be succinct like written content. Any video over 3 minutes is usually too long unless it is a training vehicle for your audience. Example of lawyer Gary Gwilliam’s compelling video about his fight to conquer alcoholism and addiction: