Twitter launches another scheme to make money

'Promoted Accounts' will allow advertisers to buy spots in the 'Who To Follow' column placed beside a user's tweet stream.

As it warned us last week, Twitter launched another scheme today to exploit its 200 million users for advertising purposes. In addition, it took some baby steps toward smoothing relations between itself and third-party developers.

This latest revenue generator is called Promoted Accounts. It was announced last week by then-COO Dick Costolo at the IAB Mixx conference in New York City. Costolo was named CEO of the company today, as his predecessor, Evan Williams, announced he was stepping down to focus all his energies on product development.

Promoted Accounts allows advertisers to buy spots in the "Who To Follow" ] column placed beside a user's tweet stream. The feature is designed to help users discover other users with similar interests. For advertisers, it would serve as a way to pump up their following.

To make the feature more palatable to members, the same algorithm that's used to suggest members a user should follow will also be used to determine if a promoted account should appear in the list. Carolyn Penner explained the process this way today at Twitter's company blog:

"Promoted Accounts are suggested based on a user's public list of whom they follow. When an advertiser promotes an account, Twitter's algorithm looks at that account's followers and determines other accounts that those users tend to follow. If a user follows some of those accounts, but not the advertiser's account, then Twitter may recommend the advertiser's Promoted Account to that user. For example, a lot of people who follow several gaming-related accounts also follow @xbox. If someone follows gaming-related accounts, but not @xbox, Twitter may recommend @xbox to that person."

Twitter accounts listed in the Who To Follow section can be hidden by clicking a box on the item. Theoretically, the same will be true for Promoted Accounts appearing in the area.

Promoted Accounts will also be appearing in the "Suggestions for You" area on the right side of a user's Twitter home page.

Users shouldn't worry about being overwhelmed by Promoted Accounts at this stage of the game. Penner explained that the program is in the testing phase and only a handful of companies will be initially participating in it.

In addition to the Promoted Accounts announcement, Twitter revealed that it has begun testing syndication of its Promoted Products program with some third-party developers, such as HootSuite. Under the scheme, the third-party partners will share in the revenues created by Promoted Tweets and Promoted Trends when they promote those products at their sites.

The move appears to be calculated to create some stability for developers of Twitter applications, who have seen early stage investment for their ideas dip 50 percent] in the last year.

Join the CSO newsletter!

Error: Please check your email address.

Tags webtwitterinternet

More about ABHootSuite

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John P. Mello Jr.

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts