Skip to main content

30 Terrific Twitter Facts And Figures



Twitter has always suffered an image problem and is not usually taken very seriously by the general public. Its name doesn’t help with some people even saying that ‘Twitter is for twits’.
Despite this glamor and brand problem this has not held back its growth after its humble origins and launch in 2006.

Since then Twitter has gained popularity worldwide and is estimated to have 225 million users, generating 65 million tweets a day and handling over 800,000 search queries per day. It is sometimes described as the “SMS of the Internet” and its 140 character limit keeps the messages short and simple.

Its attraction as a social web media platform is maybe in its simplicity and real time messaging that enables breaking news and information to hit the web instantly without filt30 Terrific Twitter Facts and Figures:-

Twitter was created in March 2006 by Jack Dorsey and launched in July of that year.

Twitter’s origins lie in a “day long brainstorming session” that was held by board members of the podcasting company Odeo. While sitting in a park on a children’s slide and eating Mexican food, Dorsey introduced the idea of an individual using an SMS service to communicate with a small group.

The first Twitter prototype was used as an internal service for Odeo employees and the full version was introduced publicly on July 15, 2006

The original project code name for the service was ‘twttr‘, an idea that Williams later ascribed to Noah Glass, inspired by the name of the social media image website ‘Flickr’ and the five-character length of American SMS short codes.

The team finally settled on the name ‘twitter‘, which means ‘chirps from birds’ in essence ‘a short burst of inconsequential information’

The tipping point for Twitter’s popularity was the 2007 South by Southwest (SXSW) festival. During the event, Twitter usage increased from 20,000 tweets per day to 60,000.

It had 400,000 tweets posted per quarter in 2007

In 2008 there were only 3 million registered users

In 2008 there were only 1.25 million tweets per day

Jan 2008 there were only 8 employees

In 2009 or 2 years ago Twitter had 8 million registered users

In 2011 there are now over 400 employees

75% of Twitter traffic comes from third-party applications

60% of all tweets come from third-party apps

There are over 100,000 Twitter applications

A Forrester report revealed that “Twitterers are the connected of the connected, overindexing at all Social Media habits. For example, Twitterers are three times more likely to be Creators (people who create and share content via blog posts and YouTube) as the general US population” (source Forrester report “Who Flocks to Twitter”)

3 years, 2 months and 1 day…the time it took from the first tweet to the billionth tweet.

It now takes one week for users to send a billion Tweets.

In March 2010 the average number of tweets people sent per week was the the 350 million.

140 million is the average number of tweets people sent per day in February 2011

177 million tweets sent on March 11, 2011.

When Michael Jackson died on June 25, 2009 there were 456 tweets per second (TPS)…a record at that time.

The current TPS record is 6,939 tweets per second set 4 seconds after midnight in Japan on New Year’s Day

572,000 is the number of new accounts created in one day (March 12, 2011)

460,000 is the average number of new accounts per day created in February, 2011

182% is the increase in number of mobile users over the past year.

In March 2011 there are an estimated 225 million users

25 billion tweets sent on Twitter in 2010

100 million new accounts added on Twitter in 2010

The first unassisted off-Earth Twitter message was posted from the International Space Station by NASA

astronaut T. J. Creamer on January 22, 2010

Comments

Popular posts from this blog

How to Put Google Adsense Below Post Title in Blogger?

Adsense is used by majority of expert bloggers for their website monetization because it is a cookie based contextual advertising system that shows targeted ads relevant to the content and reader. As bloggers are paid on per click basis, they try various ad placements on the blog to  increase the revenue  and get maximum clicks on the ad units. Well, on some blogs, you might have seen Adsense ad units placed below the post title. Do you know why? It is because the area just below the post title gets the most exposure and is the best place to put AdSense ad units to increase  Click Through Rate (CTR). Even though ads below post title work like a charm but this doesn’t mean that it will work for you as well. If you want to find out the best AdSense ads placement for your blog, try experimenting by placing ads at various locations such as header, sidebar, footer, etc. You can try other  blog monetization methods  as well to effectively monetize y...

Streamlining Java Web Application Deployment with React WAR Generator

In the ever-evolving world of web development, managing builds and deployments can often be cumbersome and error-prone. Today, we're excited to introduce a tool designed to simplify and streamline this process: the React WAR Generator . What is the React WAR Generator? The React WAR Generator is a Python-based tool that automates the creation of WAR (Web Application Archive) files for Java web applications. It caters specifically to frontend projects built with React or similar frameworks, making it easier to package and deploy your web applications to a Tomcat server. Key Features Profile-Based Builds : With support for multiple profiles ( dev , test , prod , default ), you can build your application according to different environments and configurations. Version File Generation : Optionally generate a version file that integrates versioning information directly into your TypeScript files, ensuring your build versions are always up-to-date. Tomcat Deployment : Simplify your deploy...

20 Windows Keyboard Shortcuts You Might Not Know

Global Windows Shortcuts Win+1, 2, 3, 4, etc. will launch each program in your taskbar. It is helpful then to keep your most used programs at the beginning of your task bar so you can open them one right after another. This also works in Windows Vista for the quick launch icons. Win+Alt+1, 2, 3, etc. will open the jump list for each program in the taskbar. You can then use your arrows to select which jump list option you want to open. Win+T will cycle through taskbar programs. This is similar to just hovering over the item with your mouse but you can launch the program with Space or Enter. Win+Home minimizes all programs except current the window. This is similar to the Aero shake and can be disabled with the same registry key. Win+B selects the system tray which isn’t always useful but can come in very handy if your mouse stops working. Win+Up/Down maximizes and restores down the current window so long as that window has the option to be maximized. It is exactly t...

Mafia 2 PC Game Download Free ISO Full DLC

Mafia 2 PC Game Review: Mafia 2 Plaza free download game is first person shooting game released for pc and PlayStation 3. PC Game game mafia II is the second  Sequel of Mafia Series Launched  By Daniel Vávra in 2010. Mafia 2 is an open world map game. Just like  GTA IV For PC easy to install and run  on windows 10 64 bit. Game story is based on gang war in which the mafia runs the city and do all the crimes.  Gangs Run The City however  the player plays the important role in the game to be a cop in the game.Best weapons and New Graphics In mafia II Game For PC, World Wide Multiplayer Game For PC Play it online low system Requirements. PROOF :- Mafia 2 Complete Free Download. And find out the eve dance in the game. The game has been played by most of the Pro Games.The game can be played in Core 2 Duo mafia system requirements. Download Game for pc direct single link free.  Gta v download full game and install  it on pc. Mafi...

sms spoofing sites

What is SMS Spoofing? SMS Spoofing allows you to change the name or number text messages appear to come from. The Story Behind SMSspoofing.com SMSspoofing.com initially was a service that launched in August 2005 allowing users to spoof SMS text messages. However, the service only lasted a few days due to legal threats from around the world. Pressure was put on us by our bulk text messaging provider because mobile carriers around the world were complaining that they were responsible for thousands of spoofed SMS messages. The plug was pulled and we were forced to stop offering our SMS spoofing service. In a matter of days over 250,000 people had visited this site and over 25,000 users from around the world, mostly in Europe (specifically the Czech Republic, where we were prominently featured by the media), had signed up for our service. This website has pretty much been abandoned until we decided to turn this site into an information site in June 2008! Now we're back a...

QWERTY-keyboard when this idean came

QWERTY QWERTY   / ˈ k w ɜr t i /  is the most common modern-day  keyboard layout . The name comes from the first six  keys  appearing on the top left letter row of the keyboard and read from left to right: Q-W-E-R-T-Y. The QWERTY design is based on a layout created for the  Sholes and Glidden typewriter  and sold to  Remington  in 1873. It became popular with the success of the Remington No. 2 of 1878, and remains in use on electronic keyboards due to the  network effect  of a standard layout and a belief that  alternatives  fail to provide very significant advantages. [ 1 ]  The use and adoption of the QWERTY keyboard is often viewed as one of the most important case studies in  open standards  because of the widespread, collective adoption and use of the product. [ 2 ] History and purposes [ edit ] Keys are arranged on diagonal columns, to give space for the levers. Main article:  Sh...

what is LOREM ipsum and why do designers use it

What is Lorem Ipsum? Lorem Ipsum  is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. Why do we use it? It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now...

HOw to hack face book real working By hackingloop.com{shared by me}

Requirement to hack someone's Facebook account: 1. Victim (whose  Facebook account password  you wanna hack) should be on Facebook. 2. Create four to five fake  Facebook accounts (three are sufficient but one more for bonus). I will advice you that create accounts with girl names and put an awesome girls photograph. Fill the basic profile.. Why i am saying create account with Girl names is just because Hungry boys accepts girls  friend  request without any delay. And if you know the person personally then create account with names of his near ones and say that you have created new profile so add you as a friend. Note all the three to four fake accounts should not be  friends  or any relationship with each other. 3. Most important requirement you need to add all above three account to the friends list of victim whose  Facebook account  you want to hack. Above method will be helpful for that :P. 3. ...