8 questions and answers about Twitter

The other day, I received a question regarding how all this Twitter stuff works.  I spent a little time explaining the concepts and then decided that I should write a blog about it.  I’m sure everyone would like to hear about Twitter and how it’s being used for Social Networking and Social Marketing.
Continue reading

Posted in Blog | Tagged , , | Leave a comment

A picture explains Social Network growth

Cultivate Active Social Network

Cultivate Active Social Network

A picture is worth a thousand words.  This picture comes to life with the simple truth about why some people’s networks are growing like crazy while others are not doing so well.
Continue reading

Posted in Blog | Tagged | Leave a comment

Poll: Which Social Networks have you joined?

I personally participate in several Social Networks.  Just for fun, I’m curious which Social Networks you participating in?

If there are some networks not listed, then list them in the comments section.


[poll id=”3″]

Posted in Blog | Tagged , | Leave a comment

email SPAM combat strategy: Part 2

In the previous post email SPAM combat strategy: Part 1 I introduced the concept of using tracer emails to help track where your email has been and possibly who’s been sharing it.  In this post, I will be sharing how to manage all these gmail accounts using a single email application.
Continue reading

Posted in Blog | Tagged , | 2 Comments

email SPAM combat strategy: Part 1

Email is a wonderful tool used to communicate ideas. Email is often used to build community across the world wide web.

Daily scenarios on the internet:

  1. You publish your email, so the public can send email directly to you.
  2. You want a rebate, so you have to supply a valid email address in order to get your cash back.
  3. You want information, a free eBook or report, so you have to give an email in order to receive.
  4. You want to subscribe to a newsletter, the cost is free except you must provide an email address
  5. You want participate in a social network, but you must use an email address in order to gain access.

The problem: Each of these scenarios are great reasons to provide an email address.  Unfortunately, there are forces at work that want to send you SPAM; Emails that are unsolicited and unwanted.  When they, the SPAMMERS, get their hands on your email address they abuse it and share it with their associates who do the same until you are forced into killing lots of time every day wading through an endless sea of useless information just to find those few relevant emails.

Continue reading

Posted in Blog | Tagged , | 1 Comment