Top #Cloud, #Security, #Virtualization influencers and 5 tips on how to reach them

Facebook, Twitter, LinkedIn and more recently Foursquare. Those are the buzzwords that rightfully comes to mind when we talk social media.

Often, another critical dimension stays unnoticed: Social media is a network of virtual communities.

By communities, understand a large group of like-minded people, highly passionate, highly interconnected (through Blogs, Twitter, Facebook, LinkedIn).

High Tech Communities
(Cloud in Red, Virtualization in Blue, Security in Orange)

The example above is from a set of 4 closely related communities:

  • High Tech: Cloud Computing, Virtualization, Security and Storage

We took the top 500 influencers (english language) for each of the above community, except for storage which has a bit more than 100. The aggregate number of conversations from them is close to a million over a 6 months period. Next, we processed them through our social network analysis algorithm to create this map.

(By the way, there’s a full study available for those who want more details about the analysis).

Notice that the 4 communities:
– stay generally very distinct. The exceptions is for storage  because it’s a smaller community. Indeed, influencers from Storage can be found in the Virtualization community, leading to the conclusion that storage conversations are happening often in the context of virtualization.
– display affinities: Security and Cloud Computing are closer to Virtualization than Cloud Computing is to Security.

In this network of virtual communities, 5 important factors are to be considered:

  1. Relevance: Virtual communities focus on specific and well-defined scopes.
    Think high tech is a community? Think twice. High Tech is merely a broad category.
    Indeed, we mapped more than 50 separate communities within High Tech (i.e. cloud computing, security, open source, b2b marketing … just to name a few)
  2. Separation: Virtual communities that focus on different scope don’t overlap much.
    The world has become one of “specialists”. Nowadays you can be expert on one matter, may be two.
    In the experiment above, we found an overlap of less than 5% between those closely related communities.
  3. Shape and Size: Virtual communities can be very large.
    There are many “specialists” and some have decided to become leading voices in their respective communities.
    Its’ possible to find 100s or 1000s of those voices in any given communities. Millions of like-minded people listen to them.
  4. Interconnectedness: Virtual communities are powered by a network of relevance.
    Some communities are very tightly interconnected. Understanding the network topology can provide clues to plan the optimum engagement strategy.
  5. Influence: Communities are the place where influence happens.
    One can only be influential on something to someone if they have that something in common.
    In the context of communities, something is content. It’s social media currencies and the stepping stone to weave relationships with one’s ecosystem.

Join one of our webinars if you want to know more about our technology:

webinar to answer top questions like "How are the rankings calculated?" and "How are the communities defined and mapped?"

Here’s the list of the Top 20 for the 4 communities used for this analysis:

Top 20 in ‘Cloud Computing’ CommunityTop 20 in ‘Virtualization’ Community
http://www.cloudave.comCloudAvehttp://www.yellow-bricks.comYellow-Bricks
http://www.datacenterknowledge.comData Center Knowledgehttp://virtualgeek.typepad.comVirtual Geek
http://www.roughtype.comNicholas Carr’s Bloghttp://blog.scottlowe.orgblog.scottlowe.org
http://blogs.zdnet.com/SAASZDNethttp://www.rtfm-ed.co.ukRTFM Education
http://www.allthingsdistributed.comAll Things Distributedhttp://www.virtualization.infovirtualization.info
http://blogs.gartner.com/thomas_bittmanThomas Bittmanhttp://www.vsphere-land.comvSphere-land!
http://www.highscalability.comHigh Scalabilityhttp://www.boche.net/blogboche.net
http://stage.vambenepe.comWilliam Vambenepehttp://www.ntpro.nl/blogEric Sloof
http://perspectives.mvdirona.comPerspectiveshttp://www.vmetc.comVMETC.com
http://blogs.gartner.com/andrea_dimaioAndrea DiMaiohttp://www.virtu-al.netVirtu-Al
http://cloudcomputing.sys-con.comCloud Computing Journalhttp://www.techhead.co.ukTechHead
http://www.elasticvapor.comElasticVaporhttp://www.gabesvirtualworld.comGabes Virtual World
http://www.rationalsurvivability.com/blogRational Survivabilityhttp://blogs.netapp.com/virtualstorageguyNetApp
http://blogs.gartner.com/anthony_bradleyAnthony Bradleyhttp://www.vmwarevideos.comVMware Videos
http://gevaperry.typepad.comThinking Out Cloudhttp://www.brianmadden.comBrian Madden
http://blog.softwareinsider.orgA Software Insider’s Point of Viewhttp://www.vmblog.comVMblog.com
http://www.biske.com/blogTodd Biskehttp://www.nickapedia.comNickapedia
http://blogs.gartner.com/nick_gallNick Gallhttp://technodrone.blogspot.comTechnodrone
http://smoothspan.wordpress.comSmoothSpan Bloghttp://www.vinternals.comvinternals
http://www.redmonk.com/coteCoté’s People Over Processhttp://www.vcritical.comVCritical
Top 20 in ‘Security’ CommunityTop 20 in ‘Storage’ Community
http://www.krebsonsecurity.comKrebs on Securityhttp://blog.fosketts.netStephen Foskett
http://www.schneier.com/blogSchneier on Securityhttp://www.thestoragearchitect.comThe Storage Architect
http://taosecurity.blogspot.comTaoSecurityhttp://storagezilla.typepad.com/storagezillaStoragezilla
http://www.securosis.comSecurosishttp://www.storagemojo.comStorageMojo
http://www.securityfocus.comSecurityFocushttp://blog.scottlowe.orgscottlowe.org
http://www.f-secure.com/weblogF-Securehttp://blogs.hds.com/huHu Yoshida
http://www.threatpost.comthreatposthttp://www.drunkendata.comDrunkenData
http://ha.ckers.orgha.ckers.orghttp://www.storagerap.comStorageRap
http://isc.sans.orgSANS Internet Stormhttp://www.storagenerve.comStorageNerve
http://jeremiahgrossman.blogspot.comJeremiah Grossmanhttp://thestorageanarchist.typepad.comStorage anarchist
http://www.net-security.orgHelp Net Securityhttp://storagebod.typepad.com/storagebods_blogStoragebod
http://www.scmagazineus.comSC Magazine UShttp://www.yellow-bricks.comYellow-Bricks
http://www.sophos.com/blogs/gcNaked Securityhttp://blogs.netapp.com/virtualstorageguyVirtual Storage Guy
http://sunbeltblog.blogspot.comSunbelthttp://www.backupcentral.comBackup Central
http://blog.metasploit.comMetasploithttp://blogstu.wordpress.comStuart Miniman
http://ddanchev.blogspot.comDancho Danchevhttp://www.storagemonkeys.comStorage Monkeys
http://www.pauldotcom.comPaulDotComhttp://blogs.hds.com/clausClaus Mikkelsen
http://blog.didierstevens.comDidier Stevenshttp://blogs.hds.com/christopheBChristophe Bertrand
http://www.mckeay.netNetwork Security Bloghttp://blogs.hds.com/davidDavid Merrill
http://www.avertlabs.com/research/blogMcAfee Labs
eCairn high-tech community social media engagement report

12 thoughts on “Top #Cloud, #Security, #Virtualization influencers and 5 tips on how to reach them

Leave a Reply

Your email address will not be published. Required fields are marked *