Browse Definitions:
Definition

tweet jam

Contributor(s): Ivy Wigmore

A tweet jam is a moderated discussion on Twitter that is planned around a particular question or topic, promoted in advance and scheduled for a specific time period. 

A tweet is a post on Twitter. Tweet jams are public discussions, open to all interested Twitter users. The discussion is organized around hashtags relevant to the conversation. Users find specific tweet jams by searching for the hashtag(s) and participate by adding the same hashtags to their tweets. 

An announcement for a tweet jam usually appears first on a website. Here's an example of how our sister site SearchCIO posted details for their tweet jam about shadow IT and explained how to participate:

Event details:

Date: Wednesday, March 26, 2014
Time: 3 p.m. EDT
Host: @searchCIO
Hashtag: Use and follow #CIOChat (additional hashtags include #rogueIT, #shadowIT, etc.)

Is this your first #CIOChat? No problem. Here are the must-knows:

    • To follow the conversation, type "#CIOChat" into Twitter's search bar. From this new page, click "All" to view tweets in real time.
    • Your first #CIOChat tweet should be introductory, including your name, title and organization.
    • @SearchCIO will pose a series of questions to participants starting at 3 p.m. EDT (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#CIOChat." Each question will follow the shadow technology theme.
    • Be aware that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
    • Throughout the discussion, retweet (RT) and favorite tweets you concur with and reply to those you disagree with.

 

Some websites archive tweet jam posts for visitors to their sites. Depending on the specificity of the hashtags, it may be possible to participate in the conversation after the official tweet jam is over.

Tweet jams take their name from the musical version of a jam, an informal gathering in which all interested musicians are invited to participate and in that way help create the outcome. 

 

This was last updated in March 2014

Continue Reading About tweet jam

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close