Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Social Media Power Tools

Social Media Power Tools

Presented at the Granite Publications Social Media Summit

Andrew Chavez

July 18, 2014
Tweet

More Decks by Andrew Chavez

Other Decks in Education

Transcript

  1. ! APPS SAVE TIME • 5 minutes at a time

    adds up • go straight-to-Web from the field • purpose-built apps are like power tools
  2. ! POPULAR APPS • Hootsuite (Facebook, Twitter, Facebook, Google+, Linkedin)

    • Archives • Reports • RSS feeds • Autoscheduling • Tweetdeck • Buffer • Tweetbot • Twitter, Facebook & Facebook Pages official apps • IFTTT
  3. ! KNOW WHEN TO POST • Is the feed chronological?

    Or sorted? • How often do others post? Their posts can clobber yours • How many people do most users follow? • When are most users on the network?
  4. ! WHAT THE DATA SAY • Facebook
 Best: 1 to

    4 p.m. Worst: Weekends before 8 a.m. & after 8 p.m. • Twitter
 Best: 1 to 3 p.m. Mondays-Thursday Worst: Everyday after 8 p.m. • LinkedIn
 Best: Tuesdays-Thursdays Worst: 10 p.m. to 6 a.m. Mondays & Fridays • Google+
 Best: 9 a.m. to 10 a.m. Worst: Early mornings, evenings -SurePayroll
  5. ! HOW OFTEN TO POST • Balance presence vs. nuisance

    • Keep in mind how feeds change how posts are viewed • See how often people you follow post • Distinguish between broadcasts and interactions • Balance individual vs. collective usage • Think about time decay • Tweet’s half-life: 18 minutes Facebook post: 90 minutes -SurePayroll
  6. ! WHAT THE DATA SAY (STARTING POINTS) • Facebook
 Minimum:

    2x daily Maximum: 4x daily • Twitter
 Minimum: 3x daily Maximum: Can be dozens, if news permits -SurePayroll
  7. ! POSTING STRATEGIES • Try something -> Test (more on

    that later) -> Repeat • Don’t read too much into any single event • Remember that not everything is measurable • Use scheduling and automation tools • Use your judgement
  8. ! SECURITY • One embarrassing hack can be costly •

    You need to protect against: • Large-scale attacks • Targeted attacks • Tips: • Use strong passwords • Don’t use the same password everywhere • Be careful what apps you authorize • Use two-factor authentication
  9. Q&A