IDG News Service - It's been a long time coming but a Twitter executive gave the first in-depth look on Wednesday at how the microblogging service plans to make its money.
There will be two "pillars" to Twitter's business model, Chief Operating Officer Dick Costolo said at the company's Chirp developer conference in San Francisco. The first, announced earlier this week, is Promoted Tweets, which lets advertisers pay for sponsored tweets that appear at the top of search results for certain keywords.
The second pillar is commercial accounts, which Twitter started to talk about last year. That service will allow a business to pay for a Twitter account in return for detailed analytics tools and the ability for several people to post to the same account. Commercial accounts are in beta testing with "a couple of hundred customers" and will be offered more widely in the future, though Costolo didn't say when.
It's a simple plan but one that has some potential pitfalls. Twitter will have to roll out Promoted Tweets in a way that doesn't put off users who have grown accustomed to an ad-free service, and in a way that is seen as fair and transparent to advertisers and the partners who build third-party applications like TweetDeck.
Twitter will also have to be careful how it handles the personal information it can glean about users' habits and interests from their Twitter feeds. Facebook and Google have already shown the type of backlash that companies can incur of they don't respect users' privacy.
Promoted Tweets show up today only in searches, Costolo said. Location-based information will likely follow, he said, allowing Starbucks to show a Promoted Tweet to users in a particular city, for example.
But Twitter is also sitting on a potential goldmine of personal information, since people's Twitter feeds reveal so much about their interests, taste in music and more. Costolo called it a "real-time social interest graph" -- a pool of valuable information about the topics its users are currently interested in.
"It's super-interesting and compelling for companies to be able to target that social-interest graph. It's our objective to prevent them from doing it in a way that's spammy or ... in some way negative for our users," he said. 'That's why we're rolling this out so slowly."
Journalist John Battelle, who interviewed Costolo on stage, pressed him further about how Twitter might use that information. Will advertisers be able to use the social-interest graph to target Promoted Tweets at specific groups of users?
"I don't now if we're going to do it like that," Costolo said. "We're going to be very cautious and test a bunch of stuff in different ways before we target this beyond search. Maybe the only way it will work [apart from search] is geo," or based on a user's location, he said.
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
- Ahead of IPO, Twitter shines up multimedia image
- Twitter kicks off pre-IPO investor roadshow
- As its IPO looms, Twitter faces investor grilling
- Twitter experiments with 'Event Parrot' -- a news delivery service
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts