The Social Cloud: Twitter’s Top Cloud Titans

The Social Cloud: Twitter’s Top Cloud Titans

It’s fair to say that a sizable percentage of cloud-savvy folk maintain active social networking profiles, one of which being an account on mega microblogging titan Twitter. Facebook may tout a larger membership, but few social networks (besides, perhaps, Pinterest) can brag of as compellingly quick growth as that cute little blue bird mid-song.

Twitter’s popularity stems from two of its manifold assets: the ability to receive news before the press or media, and the democratization of users (i.e., even Joe Schmo from Saskatchewan can tweet with Justin Bieber, albeit not necessarily mutually). Cloud nerds can capitalize on these advantages to not only stuff their brains to the brim with breaking cloud news, but also interact with cloud computing’s powers that be.

So who should you be following on Twitter right now? Every account that we’ll list for you below.

Let’s start with arguably the most important cloud all-star to follow: @CloudTweaks! That’s right, yours truly tweets relevant, unique, timely, and valuable cloud content throughout the day — an exceptional way to manage cloud computing headlines, opinions, and passion.

Here are a few other great accounts that deserve your follow a.s.a.p.:

Kevin Jackson (@Kevin_Jackson). For the best coverage of cloud computing via the federal government, Mr. Jackson demands a follow. He helms the popular blog Cloud Musings when not tweeting about how the cloud floats in and out of the public sector.

Jeff Barr (@JeffBarr). This “Amazon Web Services evangelist” earns his followers’ loyalty with impactful tweets on the cloud. After all, being Amazon.com’s Senior Manager of Cloud Computing Solutions, he’d know a thing or two, at least.

Adria Richards (@AdriaRichards).But You’re A Girl,” Ms. Richards often hears from someone shocked by the depths of her cloud computing expertise. Rather than fret, she turned that phrase of surprise into her own website, which she maintains when not contributing masterfully to Twitter’s cloud conversation.

David Linthicum (@DavidLinthicum). Having played a part in penning a baker’s dozen worth of books on cloud computing immediately distinguishes Mr. Linthicum as a must-follow. More than 7500 current followers continue to relish his cloud tweet wisdom.

James Urquhart (@JamesUrquhart). Authoring “The Wisdom of Clouds” quickly vaulted Mr. Urquhart to the vanguard of cloud computing expertise and helpfulness. We love the interactive feel of his Twitter page: of course you’ll find tweets containing meaningful links, but he’ll also regularly retweet or reply to his followers’ thoughts in turn.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…