The Social Cloud: Twitter’s Top Cloud Titans

The Social Cloud: Twitter’s Top Cloud Titans

It’s fair to say that a sizable percentage of cloud-savvy folk maintain active social networking profiles, one of which being an account on mega microblogging titan Twitter. Facebook may tout a larger membership, but few social networks (besides, perhaps, Pinterest) can brag of as compellingly quick growth as that cute little blue bird mid-song.

Twitter’s popularity stems from two of its manifold assets: the ability to receive news before the press or media, and the democratization of users (i.e., even Joe Schmo from Saskatchewan can tweet with Justin Bieber, albeit not necessarily mutually). Cloud nerds can capitalize on these advantages to not only stuff their brains to the brim with breaking cloud news, but also interact with cloud computing’s powers that be.

So who should you be following on Twitter right now? Every account that we’ll list for you below.

Let’s start with arguably the most important cloud all-star to follow: @CloudTweaks! That’s right, yours truly tweets relevant, unique, timely, and valuable cloud content throughout the day — an exceptional way to manage cloud computing headlines, opinions, and passion.

Here are a few other great accounts that deserve your follow a.s.a.p.:

Kevin Jackson (@Kevin_Jackson). For the best coverage of cloud computing via the federal government, Mr. Jackson demands a follow. He helms the popular blog Cloud Musings when not tweeting about how the cloud floats in and out of the public sector.

Jeff Barr (@JeffBarr). This “Amazon Web Services evangelist” earns his followers’ loyalty with impactful tweets on the cloud. After all, being Amazon.com’s Senior Manager of Cloud Computing Solutions, he’d know a thing or two, at least.

Adria Richards (@AdriaRichards).But You’re A Girl,” Ms. Richards often hears from someone shocked by the depths of her cloud computing expertise. Rather than fret, she turned that phrase of surprise into her own website, which she maintains when not contributing masterfully to Twitter’s cloud conversation.

David Linthicum (@DavidLinthicum). Having played a part in penning a baker’s dozen worth of books on cloud computing immediately distinguishes Mr. Linthicum as a must-follow. More than 7500 current followers continue to relish his cloud tweet wisdom.

James Urquhart (@JamesUrquhart). Authoring “The Wisdom of Clouds” quickly vaulted Mr. Urquhart to the vanguard of cloud computing expertise and helpfulness. We love the interactive feel of his Twitter page: of course you’ll find tweets containing meaningful links, but he’ll also regularly retweet or reply to his followers’ thoughts in turn.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…