twitter marketing tools and software

The majority of social media management tools are made specifically for Twitter or include Twitter along with other social networks. The following are just a sample of tools that can help you grow your audience, manage your status updates, monitor your brand, and measure your results:

Followerwonk – Followerwonk (mentioned earlier) will help you find people to connect with on Twitter based on keywords in their bio and location. You can sort or filter results by the number of followers, number they are following, and tweets (along with their authority score).

HootSuite – HootSuite allows you to manage your Twitter profiles (along with other social networks including Google+ pages) all in one place. With their tabs and columns layout, you easily can monitor a variety of Twitter searches for people talking about your industry, people talking about your brand, Twitter lists, mentions, direct messages, and your home screen.

edward snowden

When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it.

Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you’re pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user’s internet traffic by routing it through a network of computers run by volunteers around the world.


Together with John Steele, Paul Hansmeier and Paul Duffy, attorneys at Prenda Law (formerly known, among other things, as Steele Hansmeier, PLLC), he made life fairly miserable for thousands of potential defendants. Prenda sought out web users that allegedly downloaded porn illegally. The firm then filed copyright infringement lawsuits against the users, threatening a lawsuit that would rat the users out for downloading porn and also subject them to a substantial statutory penalty for copyright infringement. Prenda promised that it could make all of that go away for a few thousand dollars (you can read more about the scheme here). Reportedly, the firm raked in millions as a result.

Gibbs wasn’t actually a member of the firm; he was “Of Counsel” – first to Steele & Hansmeier and then to Prenda. “Of Counsel” is sort of the equivalent of an independent contractor in the legal field: you have an affiliation but you’re not a bona fide employee of the firm.


For many years, I've worked as a technical editor and writer. As a result, I've had the privilege of proofreading the work of some truly brilliant, highly educated people. I've also had to write highly technical material that was then reviewed by experts. The review process is usually cordial and intellectually stimulating. Educated people are generally grateful when you fix their typos and their dangling participles.

They tend to be tough but fair when criticizing your writing. They generally stick to a rational discussion of facts. So I was unprepared for the kind of comments I got from the general public after I started blogging. Occasionally, someone would say something like, "Wow, that's interesting." But most of the comments are nothing more than poison pen letters: abusive nonsense intended to serve no other purpose than to provoke an emotional response. In short, I often get attacked by Internet trolls.


Every now and then I have an application that is subject to a secrecy order by the government that restricts disclosure of the invention and prevents the publishing or granting of a patent. I noticed that a current application being held up really doesn’t seem to contain sensitive information but the application may have triggered the order itself by making a reference in the description that one of its many uses could be by the military. It would be analogous to an invention for an improved water bottle that you might describe as being beneficial to the military (a group that often needs bottled water in far away places) but that really is ordinary, everyday technology.

If you don’t know, the Invention Secrecy Act of 1951 requires the government to impose secrecy orders on certain patent applications that contain sensitive information, thereby restricting disclosure of the invention and withholding the grant of a patent. This requirement can be imposed even when the application is wholly created and owned by a private individual or company without government sponsorship or support.

phishing scams

The Federal Trade Commission (FTC) estimates that as many as 9.9 million Americans become victims of identity theft each year. These crimes involve personally identifying information (PII):

  • Name and address
  • Social Security number
  • Credit card numbers
  • Email or other passwords

Many people associate such crimes with online scams like phishing emails. However, most identities are stolen using low-tech methods. There are many ways thieves obtain your personal information:


These days, Debian seems to be enjoying a modest comeback among experienced users. Hardly a week goes by when I don't hear on social networking sites of two or three people giving Debian another look.

This renewed interest may reflect a growing disillusionment with Ubuntu, the Debian derivative that has partly replaced Debian in popularity among Linux users. Almost certainly, it reflects a growing willingness to experiment with distros after the last two years of user revolts against GNOME 3 and Ubuntu's Unity. As one of the oldest distributions—and one specifically focused on user choice—Debian looks reliable in the middle of such uncertainty.

Still, many users hesitate to switch to Debian. The distribution is surrounded by myths, many of them adding to an impression that it is an expert's choice and almost as difficult to use as Gentoo or Linux from Scratch.

programming language

The plumber comes to your home and asks: “What tool do you want me to use?”.

What will be your reply? “I don’t care! Fix the damn problem”.

That’s right. Everybody wants to get their work done, and get their problems fixed. They don’t care what tools you use. As a developer your job is to solve problems your costumers have in the most effective manner. This in turn means that you cannot use the same tool for every type of problem. Can you use an electric driller to fix a small leak in the pipes? No. You may want to use the duct tape for that.

Which language should I learn is a wrong question to begin with. Languages are tools in the bag of a software engineer. Before deciding upon the programing languages you want to learn, you should decide what type of problems you would like to work on. Would you like to work on web technologies? Would you like to work in the Linux ecosystem? Would you like to work in the mobile platforms? There are a million different niches in programming world and you have to ask yourself all those rhetorical questions that comes to your mind and then decide which language suites your choice.

This does not matter that the tools are not important. They are; but they are not more important than the problem at hand.



The vast majority of business websites out there tend to stay laser-focused on their goals. Whether they’re intended to sell a product or generate leads, it seems that all of the content placed on their websites works towards this end. While there’s something that can be said about the strategy, changes at Google, Bing, and social media sites makes it beneficial to post content that does nothing more than educate, entertain, or act as a resource for people without attempting to sell or generate a lead.

If you want to truly get ahead of your competitors this year, you should be willing to devote a little bit of time (or money if you choose to buy it) every month on content.

This isn’t the type of content designed to get ranked in the search engines, but it can help your important pages get ranked. It’s not the kind of content that will generate leads through social media, though you have opportunities every time someone lands on your site. It’s the type of content that is truly giving – you’re motives should be business-oriented but the content should be able to stand alone.

Project management plan

A good--or bad--project manager can make the difference between a project coming in on time and on budget and it being a failure. How can you spot a good project manager? talked to experts and IT executives to find out.

CIO — Just because someone has the title of "project manager" does not mean he knows how to effectively manage projects, as many CIOs and other IT executives have learned the hard way.

So how can you tell a good project manager from a bad one? surveyed project management experts and executives to learn what skills are required to successfully manage projects--that is, to ensure that projects are kept on track and stay on budget.

Here are seven skills project managers need in order to be effective and successful:

How effective are the tweets you send that are important to your business? How are you monitoring the effectiveness of these tweets?

By monitoring what happens to your important tweets you can begin to understand what works and what doesn’t work and make improvements.

Here are 8 tools that are useful for monitoring the effectiveness of your tweets.


Hello Everyone :)

Thank you for visiting Sci & Tech Portal. It contains articles about Information technologies, Lifestyle...

You will surely find something to read in between the lines too, namely, my love and effort invested into making my communication with you original, useful, and attractive, as well as a promise of continuous improvement.

If you've found the site helpful or useful then please consider throwing a coffee my way to help support my work