Marketing Cloud Social

Total Page:16

File Type:pdf, Size:1020Kb

Marketing Cloud Social Marketing Cloud Social Salesforce, Winter ’22 @salesforcedocs Last updated: September 15, 2021 © Copyright 2000–2021 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS MARKETING CLOUD SOCIAL . 1 Marketing Cloud Command Center . 1 Social Studio Automate . 60 Social Studio Mobile . 107 Social Studio . 180 INDEX . 537 MARKETING CLOUD SOCIAL Create, manage, and monitor engagement with your social media content and advertising presence. Marketing Cloud Command Center To showcase a brand's social presence, use the Marketing Cloud Command Center application. Command Center gives you live details about what is happening on social media. Use Command Center on large displays to monitor and display high-level social performance information. Social Studio Automate Social Studio Automate augments your existing social platform functionality with the power of automation. It’s a rules-based and web-based software engine designed to process and sort social media content. With custom conditions and selectable actions, you can process, augment, sort, and direct incoming social media content for follow-up. You can manage content for individuals and teams across locations, brands or departments, all in a common interface with full planning and scheduling capabilities. Social Studio Mobile To get closer to your customers on iOS devices and Android phones, use Marketing Cloud Social Studio Mobile. Use the same Social Studio functionality from anywhere as if you were sitting on your desk. Download the app for free from the iOS App Store or Google Play. Social Studio Social Studio is a one-stop solution to manage, schedule, create, and monitor posts. You can organize posts by brand, region, or multiple teams and individuals in a unified interface. Social Studio offers powerful real-time publishing and engagement. Marketing Cloud Command Center To showcase a brand's social presence, use the Marketing Cloud Command Center application. Command Center gives you live details about what is happening on social media. Use Command Center on large displays to monitor and display high-level social performance information. Note: Learn about the Work.com Command Center and Salesforce's response to COVID-19. Continue reading for information about the Marketing Cloud Command Center in Social Studio. Command Center acts as the social media hub for summarized information from a brand's Facebook or Twitter accounts. Access the app from its own URL or use an iPad that meets requirements. Command Center provides a central location so you can monitor and respond to social media posts quickly. You can route responses to the appropriate department. And, you can immediately respond and forward posts that contain product feedback, support issues or questions, or product suggestions to the right department in real time. To ensure that you get the latest Social Studio features, sign up on our Marketing Cloud Salesforce Help for Marketing Cloud Release Communications. Specify Marketing Cloud under Interests. Follow the steps at Marketing Release Communications. Use Cases Command Center can be used in various ways across organizations, for different purposes and industries. 1 Marketing Cloud Social Use Cases Get Started with Command Center The Get Started with Command Center documentation page details how to get started with Marketing Cloud Command Center including prerequisites. Navigation In Command Center, you can configure different options and view and create specific displays. These displays show customized data for social account and top profiles post activity. Command Center FAQs Get the answers to frequently asked questions about Marketing Cloud Command Center Glossary View the Command Center glossary. SEE ALSO: Use Cases Get Started with Command Center Use Command Center on an iPad Use Cases Command Center can be used in various ways across organizations, for different purposes and industries. Command Center can be used: • Across organizations • For Different common purposes • For industries Organization-wide Use Cases Command Center can be used across the organization in these ways: • Display the social health of your brands daily • Connect the entire organization to the consumer by putting the consumer on everyone's desk and in everyone's hands • Inform advertising and content strategy and development • Discover situations as they unfold and respond quickly • Empower teams with a platform to monitor and handle crisis management • Stream live information to customers at events, online, and via mobile • Show employees, partners, and vendors innovations at headquarters • Share metrics faster and in real time • Organize around several key consumer-focused metrics that appear globally • Run your social media program from anywhere in the world 2 Marketing Cloud Social Use Cases Common Purposes Common Use Feature Business Insights • Identify real-time trends • Track Social KPI and any Advocates and Detractors • Ability to go from a broad global view down to a focused post level view Actionable Insights • Supplement Service and Support activities • Act as a nerve center with output becoming the input to operational processes • Interfacing with Salesforce Customer Service Event and Campaign • Promote attendee social participation and feedback • Measure campaign effectiveness • Adjust or amplify content in real time based on performance and trends Thought Leadership and Social Evangelism • Promote social internally • Promote internal social evangelism • To differentiate from other companies with customers Industries Using Command Center • Education and Non-Profit • Financial Services • Media & Entertainment • Retail • Services • Healthcare • Technology • Travel • CPG SEE ALSO: Configure Command Center Customize Displays in Command Center Navigation 3 Marketing Cloud Social Get Started with Command Center Get Started with Command Center The Get Started with Command Center documentation page details how to get started with Marketing Cloud Command Center including prerequisites. Command Center Prerequisites To use Marketing Cloud Command Center, review these software and hardware prerequisites. Access Command Center Access Marketing Cloud Command Center using a customized URL in a web browser. You can also access Command Center on an iPad by creating and using a home screen shortcut. See screens with view-only with no editing possible. To change or edit screens, change them through a desktop web browser. Considerations for Using Topic Profiles in Command Center You create topic profiles in Social Studio for use in Marketing Cloud Command Center. When configuring topic profiles in Social Studio, optimize their effectiveness by considering post volume and keyword group information considerations. Configure Command Center Configure and customize Command Center to show current social media posts by themes, custom headings and profanity settings to best suits your needs. Enable specific displays a user can add. Customize Displays in Command Center To set the time frame and select to show posts from social accounts and topic profiles, customize the screens in Marketing Cloud Command Center. Add multiple displays showing different options and accounts. Use Command Center on an iPad Command Center can be used on a 9.7 inch iPad, but not the iPad Pro. SEE ALSO: Access Command Center Considerations for Using Topic Profiles in Command Center Configure Command Center Command Center Prerequisites To use Marketing Cloud Command Center, review these software and hardware prerequisites. Software • iPad support – Support for Safari browser only. – Supports only 1024x768 on 9.7 iPad only (not iPad pro or iPad Mini). Note: To get the maximum screen size for Command Center, 1. Add a shortcut to the home screen. 2. To show full screen without safari menu bar, click Command Center. • Browser Compatibility: Since Marketing Cloud Command Center is web-based and independent of operating platform, it is compatible with the following browsers: 4 Marketing Cloud Social Get Started with Command Center – Chrome (current version*) – Safari – Firefox (current version*) – Internet Explorer (v11, v10, and v9*) Note: Support for IE9 and older versions of Chrome and Firefox is 'Grade B: functional, untested.' See Graded Browser Support for more information. • A valid login and password to Command Center. Contact your account executive or email [email protected] with any account issues. • A valid Marketing Cloud account and password if accessing Command Center within Marketing Cloud. Recommended Hardware Review these recommendations for Expo or War Room Command Centers • 1.8 GHz or faster processor • 4–8 GB of available RAM • 1 GB of hard-disk space • Broadband Internet Hardwired Connection (wireless not recommended) • Minimum 42-inch Screen • 1920x1080 display with 32-bit video card • Appropriate and compatible cable for HD video connection (VGA not recommended) Access Command Center Access Marketing Cloud Command Center using a customized URL in a web browser. You can also access Command Center on an iPad by creating and using a home screen shortcut. See screens with view-only with no editing possible. To change or edit screens, change them through a desktop web browser. Access Command Center with a URL You can access Marketing Cloud Command Center from a customized URL using a desktop web browser. Also, you can access Command
Recommended publications
  • Secure Authentication Mechanisms for the Management Interface in Cloud Computing Environments
    UNIVERSITY OF BEIRA INTERIOR Engineering Secure Authentication Mechanisms for the Management Interface in Cloud Computing Environments Liliana Filipa Baptista Soares Dissertation Submitted in Partial Fulfillment of the Requirement for the Degree of Master of Science in Computer Science and Engineering (2nd Cycle Studies) Supervised by Prof. Dr. Pedro Ricardo Morais Inácio Covilhã, October 2013 ii To my beloved family, especially to my grandparents. iv Acknowledgements The endurance to overcome obstacles or predisposed objectives in life depends on how each one envisages them. It is up to each one to extract the most valuable lessons from each journey and transform them into knowledge. Without the guidance and support of very particular persons, it would have not been possible to accomplish this dissertation and many lessons would have not been learned. I hereby thank my mother and father, to whom I am mostly grateful, for helping me to achieve my goals, particularly those of my academic quest. I would like to thank my sister, Cátia, for her immeasurable support, and my grandparents, for always demonstrating their love and will to live. I am also grateful to my supervisor, Prof. Dr. Pedro Ricardo Morais Inácio, not only for the help, charisma and readiness he demonstrated to complete this stage, but also for being resourceful in aiding throughout other steps of my professional life. I also acknowledge the Multimedia Signal Processing – Covilhã Group at the Instituto de Telecomunicações, which hosted this dis- sertation work and the final project of my first degree, and the research folk in it, particularly Miguel Neto for lending me a smartcard reader temporarily.
    [Show full text]
  • Pega Customer Service Reference Guide Iii
    Pega Customer Service 7.1.4 Version REFERENCE GUIDE © Copyright 2015 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. Other brand or product names are trademarks of their respective holders. Consult the 718ThirdPartyLicense.pdf file on the installation media for information about the software delivered with the product. Notices This publication describes and/or represents products and services of Pegasystems Inc. It may contain trade secrets and proprietary information that are protected by various federal, state, and international laws, and distributed under licenses restricting their use, copying, modification, distribution, or transmittal in any form without prior written authorization of Pegasystems Inc. This publication is current as of the date of publication only. Changes to the publication may be made from time to time at the discretion of Pegasystems Inc. This publication remains the property of Pegasystems Inc. and must be returned to it upon request. This publication does not imply any commitment to offer or deliver the products or services described herein. This publication may include references to Pegasystems Inc. product features that have not been licensed by you or your company. If you have questions about whether a particular capability is included in your installation, please consult your Pegasystems Inc. services consultant. Although Pegasystems Inc. strives for accuracy in its publications, any publication may contain inaccuracies or typographical errors, as well as technical inaccuracies. Pegasystems Inc. may make improvements and/or changes to the publication at any time. Any references in this publication to non-Pegasystems websites are provided for convenience only and do not serve as an endorsement of these websites.
    [Show full text]
  • Technical Design of Open Social Web for Crowdsourced Democracy
    Project no. 610349 D-CENT Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Version Number: 1 Lead beneficiary: OKF Due Date: 31 October 2014 Author(s): Pablo Aragón, Francesca Bria, Primavera de Filippi, Harry Halpin, Jaakko Korhonen, David Laniado, Smári McCarthy, Javier Toret Medina, Sander van der Waal Editors and reviewers: Robert Bjarnason, Joonas Pekkanen, Denis Roio, Guido Vilariño Dissemination level: PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Approved by: Francesca Bria Date: 31 October 2014 This report is currently awaiting approval from the EC and cannot be not considered to be a final version. FP7 – CAPS - 2013 D-CENT D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Contents 1 Executive Summary ........................................................................................................................................................ 6 Description of the D-CENT Open Democracy pilots ............................................................................................. 8 Description of the lean development process .......................................................................................................... 10 Hypotheses statements
    [Show full text]
  • How to Install MFA Browser Authenicator Extension
    How to… Set up Multi-Factor Authentication (MFA) on your Chrome, Edge or Firefox using Extensions Introduction Griffith has introduced MFA to ensure the security of your information by adding an additional layer of authentication to your Single Sign-On. PingID is the MFA tool used by Griffith. This guide shows how to setup MFA using a Chrome, Edge or Firefox Authenticator Extension. Step 1 – Enable profile and syncing for your Chrome, Edge or Firefox browser Refer to links below for information on how to enable profile and syncing for each browser: • Chrome - see Google support page at https://support.google.com/chrome/answer/2364824? • Edge - see Microsoft support page at https://support.microsoft.com/en-us/office/sign-in-and-create-multiple-profiles-in-microsoft-edge-df94e622-2061-49ae-ad1d- 6f0e43ce6435 • Firefox - see Mozilla support page at https://support.mozilla.org/en-US/kb/profile-manager-create-remove-switch-firefox- profiles Step 2 – Add an Authenticator Extension to your browser Ensure you are in the correct profile when setting up, as this will need to be logged into on each computer you wish to use when accessing Griffith apps. If you are using Chrome or Edge go to the Chrome web store - https://chrome.google.com/webstore/ If you are using Firefox go to Add-ons – https://addons.mozilla.org/en-GB/firefox/search/ Search for Authenticator or 2FA. This example uses an extension called Authenticator for Google Authenticator. Select Add Select Add Extension Your browser will confirm the extension has been added. Step 3 – Set up the Authenticator Extension as the primary authenticating method Once the Authenticator extension is added, click on the extension icon then click on the Pencil icon.
    [Show full text]
  • AN EXPLORATORY STUDY of SCIENCE BLOGGERS Degree Candidate
    ABSTRACT Title of Thesis: OPENING UP THE CONVERSATION: AN EXPLORATORY STUDY OF SCIENCE BLOGGERS Degree Candidate: Gregory Michael Masters Degree and Year: Master of Arts, 2013 Thesis Directed by: Dr. Carol L. Rogers Philip Merrill College of Journalism Over the past decade, science blogs have experienced tremendous growth and changes in organization, becoming an important part of what researchers have called the “evolving science media ecosystem.” This thesis explores the practices and perceptions of science bloggers through 20 in-depth interviews and through a review of the blogs themselves. The research suggests areas where this medium is having a unique impact on how science communication occurs. The interview results revealed that science bloggers are motivated mainly by enjoyment, have a wide variety of routines and reporting/writing processes, strive to incorporate a personal touch, and are very engaged with readers and fellow writers through social media. This research found that science blogs have important roles in complementing other forms of science communication, opening aspects of science to wider view, promoting conversations about science through blog comments and social media, and exploiting digital tools to enhance communication. OPENING UP THE CONVERSATION: AN EXPLORATORY STUDY OF SCIENCE BLOGGERS by Gregory Michael Masters Thesis submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of Master of Arts 2013 Advisory Committee: Dr. Carol L. Rogers, Chair Dr. Ira Chinoy Carl Sessions Stepp © Copyright by Greg Masters 2013 PREFACE As teenagers, my brother and I would often drive far into Western Maryland to escape the city lights, parking at the edge of fields in the middle of nowhere to lie on the hood and peer at the stars.
    [Show full text]
  • Top Comment Or Flop Comment? Predicting and Explaining User Engagement in Online News Discussions
    Top Comment or Flop Comment? Predicting and Explaining User Engagement in Online News Discussions Julian Risch, Ralf Krestel Hasso Plattner Institute, University of Potsdam, Germany fi[email protected] Abstract editors. This manual effort is costly and comes on top of the task of moderating hate speech and other banned content. Comment sections below online news articles enjoy growing Major news platforms allow users to upvote comments, popularity among readers. However, the overwhelming num- ber of comments makes it infeasible for the average news but for several reasons these platforms do not use votes as a consumer to read all of them and hinders engaging discus- ranking criterion for comments. First, there is the cold start sions. Most platforms display comments in chronological or- problem: Whenever a new comment is posted, it has not yet der, which neglects that some of them are more relevant to received any upvotes. An accordingly low rank affects the users and are better conversation starters. comment’s exposure to users and reduces its chance of ever In this paper, we systematically analyze user engagement in receiving any upvotes. Moreover, such a ranking algorithm the form of the upvotes and replies that a comment receives. can easily be gamed. Malicious users can register multiple Based on comment texts, we train a model to distinguish com- accounts or collaborate to break the ranking system and up- ments that have either a high or low chance of receiving many vote comments of their favored opinion. upvotes and replies. Our evaluation on user comments from Today’s platforms refrain from using an upvote-based TheGuardian.com compares recurrent and convolutional neu- ranking algorithm and simply sort comments chronologi- ral network models, and a traditional feature-based classifier.
    [Show full text]
  • Measuring Platform Effects in Digital Democracy
    Measuring Platform Effects in Digital Democracy Pablo Arag´on*y Vicen¸cG´omez* Andreas Kaltenbrunnery * Universitat Pompeu Fabra y Eurecat Barcelona, Spain Barcelona, Spain Abstract. Online discussions are the essence of many social platforms on the Internet. Conversations in online forums are traditionally pre- sented in a hierarchical structure. In contrast, online social networking services usually show discussions linearly by sorting messages in chrono- logical order. How discussion networks are affected by choosing a specific view has never been investigated in the literature. In this article we present an analysis of the discussion threads in Me- neame, the most popular Spanish social news platform. In January 2015, this site turned the original linear conversation view into a hierarchical one. Our findings prove that the new interface promoted new discussion network structures. In particular, the hierarchical view increased delib- eration and reciprocity based on the rhizomatic structure of discussions. Keywords: Digital democracy, Online deliberation, Online discussion, Human-Computer Interfaces, Conversation view 1 Introduction Online social platforms are playing a key role in the communication of cur- rent societies. According to Kemp (2016), more than two billion users are ac- tively participating in social media sites. The interest in online platforms has attracted increasing attention from academia over the last decade and several studies have examined the network structure of a wide array of online digital platforms, e.g. Facebook (Ugander et al., 2011), Twitter (Kwak et al., 2010), Google+ (Magno et al., 2012), Flickr (Cha et al., 2009), Youtube (Mislove et al., 2007), Wikipedia (Laniado et al., 2011), Digg (Lerman and Ghosh, 2010) and Slashdot (G´omezet al., 2008).
    [Show full text]
  • Download Google Authenticator App Download Google Authenticator App
    download google authenticator app Download google authenticator app. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67aa6d6ed8c98498 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Google Authenticator 4+ Google Authenticator works with 2-Step Verification for your Google Account to provide an additional layer of security when signing in. With 2-Step Verification, signing into your account will require both your password and a verification code you can generate with this app. Once configured, you can get verification codes without the need for a network or cellular connection. Features include: - Automatic setup via QR code - Support for multiple accounts - Support for time-based and counter-based code generation - Transfer accounts between devices via QR code. To use Google Authenticator with Google, you need to enable 2-Step Verification on your Google Account. Visit http://www.google.com/2step to get started. What’s New. - Added the ability to transfer many accounts to a different device - Added the ability of search for accounts - Added the ability to turn on Privacy Screen.
    [Show full text]
  • Donttagyourhate: Reading Collecting and Curating As Genres of Participation in LGBT Youth Activism on Tumblr
    DIGITAL CULTURE & EDUCATION, 9(1) 2017, ISSN 1836-8301 Digital Culture & Education (DCE) Publication details, including instructions for authors http://www.digitalcultureandeducation.com/ #donttagyourhate: Reading Collecting and Curating as Genres of Participation in LGBT Youth Activism on Tumblr Jon M Wargo Wayne State University Online Publication Date: 1st February 2017 To cite this Article: Wargo, J. M. (2017). #donttagyourhate: Reading Collecting and Curating as Genres of Participation in LGBT Youth Activism on Tumblr. Digital Culture & Education, 9(1), 14-31. URL: http://www.digitalcultureandeducation.com/cms/wp-content/uploads/2017/02/wargo.pdf PLEASE SCROLL DOWN FOR ARTICLE #donttagyourhate #donttagyourhate: READING COLLECTING AND CURATING AS GENRES OF PARTICIPATION IN LGBT YOUTH ACTIVISM ON TUMBLR Jon M Wargo Abstract: Interested in the semiotic stretches youth employ to navigate (in)equality online, this paper interrogates the seemingly mundane practices of youth writing with new media to read how “collecting” and “curating” were mobilized as facets of youth activism. By focusing on curating and collecting as two forms of remediated communicative practice, this paper interrogates the taking on of what youth in a larger “connective ethnography” (Hine, 2015; 2000; Leander, 2008) called a #socialjusticewarrior stance. Zeroing in and tracing the connective lives Zeke, Camille, and Jack (all names are pseudonyms) led across their networked connections of writing, this paper illuminates how issues of race, gender expression, and queer identities converged to collect a social justice orientation into the larger Kilgore and San Miguels communities. Comparatively, I provide a counter-story from one young person (Ben) whose curated work of self-presentation fostered a more cosmopolitan version of self.
    [Show full text]
  • 6. Visible Conversations: Seeing Meaning Beyond Words
    MIT Press on COVID-19 • The Social Machine 6. Visible Conversations: Seeing Meaning beyond Words Published on: Apr 27, 2020 Updated on: Apr 28, 2020 MIT Press on COVID-19 • The Social Machine 6. Visible Conversations: Seeing Meaning beyond Words People participate in many social activities online: they post pictures and videos, write long, impassioned articles, and battle each other in multiplayer games. The predominant social activity, however, is conversation in its many forms: email; chat; discussion postings; status updates; comments exchanged about photos, games, and articles; and so on. Though the form may vary, all share the fundamental quality of being exchanges of words among two or more people.1 Conversation is much more than a means for exchanging information. It is a form of social grooming: it is how we form and maintain ties, hold our community together, and establish social norms (Dunbar 1996).2 Like face-to-face speech, online conversation is an exchange of words among people. Yet there are significant differences. Most spoken conversations are ephemeral: the words disappear into the past as soon as they are said. Many online conversations are persistent, their text permanently preserved in an archive. Spoken conversations occur in real time: you hear what I say as I say it and can respond immediately. In contrast, many online conversations are asynchronous: I write a message, and you might not read and respond to it until hours, days, or more have passed. Asynchrony adds convenience, for I can maintain a long discussion with you, even if we are never free to meet at the same time, but it also drastically changes the rhythm of discourse.
    [Show full text]
  • Dao Research: Securing Data and Applications in the Cloud
    WHITE PAPER Securing Data and Applications in the Cloud Comparison of Amazon, Google, Microsoft, and Oracle Cloud Security Capabilities July 2020 Dao Research is a competitive intelligence firm working with Fortune-500 companies in the Information Technology sector. Dao Research is based in San Francisco, California. Visit www.daoresearch.com to learn more about our competitive intelligence services. Securing Data and Applications in the Cloud Contents Introduction .............................................................................................................................................................. 3 Executive Summary ................................................................................................................................................. 4 Methodology ............................................................................................................................................................6 Capabilities and Approaches .................................................................................................................................. 8 Perimeter Security ........................................................................................................................................ 9 Network Security ........................................................................................................................................ 10 Virtualization/Host .....................................................................................................................................
    [Show full text]
  • Generative Models of Online Discussion Threads
    Generative models of online discussion threads Pablo Aragón1,2 Andreas Kaltenbrunner1,3 Vicenç Gómez1 1 Universitat Pompeu Fabra 2 Eurecat, Technology Centre of Catalonia 3 NTENT Master of Intelligent and Interactive Systems Barcelona, March 3rd, 2020 Background Tutorials given at: ICWSM 2019 AAAI International Conference on Web and Social Media Munich (Germany) ASONAM 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Barcelona (Spain) 2 Outline Theoretical session (90) ● Introduction to online discussions ● Statistical modelling of online discussion threads ● Applications and open research challenges Short break (5’) Practical session (45’) Questions and answers (10’) 3 Theoretical Session 4 Theoretical session Based on the survey paper: Aragón, P., Gómez, V., García, D., & Kaltenbrunner, A. (2017). Generative models of online discussion threads: state of the art and research challenges Journal of Internet Services and Applications, 8(1), 15. https://link.springer.com/article/10.1186/s13174-017-0066-z 5 Introduction and review of previous work 6 A long time ago in a galaxy far, far away.... Bulletin Board Systems Usenet Source: wikipedia.org Source: thehistoryoftheweb.com 7 May the online discussions be with you Web-based Forums Reddit Source: phpbb.com Source: reddit.com 8 May the online discussions be with you Online discussion is a main feature of almost every social media platform. Source: get5ocial.com 9 Reddit: A New Hope Online discussion is a main feature of almost every social media platform. Online discussion is: ● Increasingly popular https://news.vice.com/en_us/article/ywebqj/ reddit-just-overtook-facebook-as-the-third- most-popular-website-in-the-us 10 Reddit: A New Hope Online discussion is a main feature of almost every social media platform.
    [Show full text]