SlideShare a Scribd company logo
1 of 18
Dell Social Media Leadership
           Summit
          David Strom
       david@strom.com
       Twitter: @dstrom
My past editorial experience
Tech B2B Evolution
• Traditional print publishers dying
  (CMP/IDG/ZD/TT/Quinn) and can’t retool for
  online
• Traditional biz publishers can’t really cover
  tech in any depth
• Blogging model is shallow
• Google is go-to starting place for many in IT
• The rise of sponsored andcustom B2B pubs
US Army is a content machine!
                                         Total followers: 123,000
                                         Weekly tweets: 118



Total
followers: >1.1                          Total
million                                  subscribers:
Weekly users:     Total followers: 700   2600                  Total Followers: 650
19,000                                   Weekly videos
                                         posted: 5
Understand who is in your trenches
Keep evaluating
  these usage
   guidelines
  frequently!
Don’t be heavy-handed
Humor counts, too
Blogs are the
     core
 technology
    for any
social media
   strategy
Long form content is still relevant!
What do these have in common?
• Laptop bluetooth drivers
• Improvements in packaging
• Images showing how to replace your battery
  on Dell.com
• Better quality of laptop speakers
Encourage real
conversations
Please use the comments to demonstrate your
  own ignorance, unfamiliarity with empirical
  data, ability to repeat discredited memes,
  and lack of respect for scientific knowledge.
  Also, be sure to create straw men and argue
  against things I have neither said nor even
  implied. Any irrelevancies you can mention
  will also be appreciated. Lastly, kindly forgo
  all civility in your discourse . . . you are, after
  all, anonymous.
Adrian Holovaty’s definition of
              journalism
• Gathering information,
• Distilling that information and
• Presenting it.
Dell social media
Dell social media
Dell social media

More Related Content

Similar to Dell social media

Diana Plazas: Global Brand Share
Diana Plazas: Global Brand ShareDiana Plazas: Global Brand Share
Diana Plazas: Global Brand ShareExpion
 
Tools and Strategies for Social Businesses
Tools and Strategies for Social BusinessesTools and Strategies for Social Businesses
Tools and Strategies for Social BusinessesJD Lasica
 
Social Media, A Brief Introduction
Social Media, A Brief IntroductionSocial Media, A Brief Introduction
Social Media, A Brief IntroductionAlex de Carvalho
 
Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike Freeman
 
Social Media Overview: June 2012
Social Media Overview: June 2012Social Media Overview: June 2012
Social Media Overview: June 2012Sociabull
 
How donuts can help you communicate in an online world
How donuts can help you communicate in an online world How donuts can help you communicate in an online world
How donuts can help you communicate in an online world George Hulbert
 
Social media Workshop RDJ + Pixelbar
Social media Workshop RDJ + PixelbarSocial media Workshop RDJ + Pixelbar
Social media Workshop RDJ + PixelbarGino Cremer
 
Digital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community NewsDigital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community NewsSteve Buttry
 
Building and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social WebBuilding and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social Weblisbk
 
Social media workshop
Social media workshopSocial media workshop
Social media workshopDigiArabs
 
Twitter for Journalists
Twitter for JournalistsTwitter for Journalists
Twitter for JournalistsKathy Gill
 
Twitter for business
Twitter for businessTwitter for business
Twitter for businessEoin Kennedy
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!AfricanCommonsProject
 
Threadless + crowdsourcing
Threadless + crowdsourcingThreadless + crowdsourcing
Threadless + crowdsourcingLalit Chopra
 
Driving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid EventDriving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid EventSpotlight Communications
 
War child social media presentation
War child social media presentationWar child social media presentation
War child social media presentationalysonlou
 

Similar to Dell social media (20)

Diana Plazas: Global Brand Share
Diana Plazas: Global Brand ShareDiana Plazas: Global Brand Share
Diana Plazas: Global Brand Share
 
Tools and Strategies for Social Businesses
Tools and Strategies for Social BusinessesTools and Strategies for Social Businesses
Tools and Strategies for Social Businesses
 
Social Media, A Brief Introduction
Social Media, A Brief IntroductionSocial Media, A Brief Introduction
Social Media, A Brief Introduction
 
Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12
 
Social Media Plymouth
Social Media PlymouthSocial Media Plymouth
Social Media Plymouth
 
Social Media Overview: June 2012
Social Media Overview: June 2012Social Media Overview: June 2012
Social Media Overview: June 2012
 
How donuts can help you communicate in an online world
How donuts can help you communicate in an online world How donuts can help you communicate in an online world
How donuts can help you communicate in an online world
 
Social media Workshop RDJ + Pixelbar
Social media Workshop RDJ + PixelbarSocial media Workshop RDJ + Pixelbar
Social media Workshop RDJ + Pixelbar
 
Digital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community NewsDigital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community News
 
Building and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social WebBuilding and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social Web
 
Twitter
TwitterTwitter
Twitter
 
Social media workshop
Social media workshopSocial media workshop
Social media workshop
 
Twitter for Journalists
Twitter for JournalistsTwitter for Journalists
Twitter for Journalists
 
Twitter for business
Twitter for businessTwitter for business
Twitter for business
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!
 
Social Media Strategy & Facebook
Social Media Strategy & FacebookSocial Media Strategy & Facebook
Social Media Strategy & Facebook
 
Threadless + crowdsourcing
Threadless + crowdsourcingThreadless + crowdsourcing
Threadless + crowdsourcing
 
Driving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid EventDriving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid Event
 
War child social media presentation
War child social media presentationWar child social media presentation
War child social media presentation
 
Productivity Apps
Productivity AppsProductivity Apps
Productivity Apps
 

More from David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsDavid Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking backDavid Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media worldDavid Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersDavid Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportDavid Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and nowDavid Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakesDavid Strom
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkDavid Strom
 
Big data analytics
Big data analyticsBig data analytics
Big data analyticsDavid Strom
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015David Strom
 

More from David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Dell social media

  • 1. Dell Social Media Leadership Summit David Strom david@strom.com Twitter: @dstrom
  • 2. My past editorial experience
  • 3. Tech B2B Evolution • Traditional print publishers dying (CMP/IDG/ZD/TT/Quinn) and can’t retool for online • Traditional biz publishers can’t really cover tech in any depth • Blogging model is shallow • Google is go-to starting place for many in IT • The rise of sponsored andcustom B2B pubs
  • 4. US Army is a content machine! Total followers: 123,000 Weekly tweets: 118 Total followers: >1.1 Total million subscribers: Weekly users: Total followers: 700 2600 Total Followers: 650 19,000 Weekly videos posted: 5
  • 5. Understand who is in your trenches
  • 6. Keep evaluating these usage guidelines frequently!
  • 7.
  • 10. Blogs are the core technology for any social media strategy
  • 11. Long form content is still relevant!
  • 12. What do these have in common? • Laptop bluetooth drivers • Improvements in packaging • Images showing how to replace your battery on Dell.com • Better quality of laptop speakers
  • 14. Please use the comments to demonstrate your own ignorance, unfamiliarity with empirical data, ability to repeat discredited memes, and lack of respect for scientific knowledge. Also, be sure to create straw men and argue against things I have neither said nor even implied. Any irrelevancies you can mention will also be appreciated. Lastly, kindly forgo all civility in your discourse . . . you are, after all, anonymous.
  • 15. Adrian Holovaty’s definition of journalism • Gathering information, • Distilling that information and • Presenting it.

Editor's Notes

  1. They are a content machine. Each week they coordinate the posts on their various social media properties and there is plenty of fresh content. Any social media strategy needs to be based on terrific content, and regular infusions of it. They have this one covered, in spades.
  2. Leadership is essential. The Army’s efforts are led by Major Juanita Chang who is the Director, Online and Social Media Division for the past two years in the Army’s Office of the Chief of Public Affairs. Chang is a career soldier who has been in active duty since 1996 and served at one point as a chemical weapons officer before she got into PR. Having someone who came up through the ranks is key, because they can emphasize with the boots on the ground and know the entire Army ecosystem too. When you pick your social media team leader, keep this in mind.
  3. Take a look at some others here:http://socialmediagovernance.com/policies.php#axzz1nOhG6cnjwhat happens when an individual comes to Dell with an existing Twitter account, and how this account is treated when they leave the company.
  4. http://www.youtube.com/watch?v=8iQLkt5CG8IThis is a 4min. video from an Australian government agency about social media policy.
  5. The guidelines are all common sense and not what you would expect from an organization that believes in the chain of command. “If we can trust our soldiers with guns and grenades, why can’t we trust them with Facebook?” This is from an Army handbook that was posted on Slideshare.netKNOW WHAT YOUR AUDIENCE NEEDS!
  6. NOT THIS CORE TECH -- I know in our rush to embrace all that is new we tend to forget about the old, but blogging is still important and can cement the other social media pieces
  7. This was a four page article that got a total of 35k views on 12/28, and was a redo too! It was a fairly geeky report from the F8 developers conference.
  8. All were as the result of various social media feedback on various forums – tightening the feedback loop between Dell and its customers
  9. http://www.ritholtz.com/blog/, Barry Ritholtz, a financial journalist and speaker
  10. While working at the Washington Post, Adrian Holovaty discovered that reporters were keeping a detailed database of soldiers killed in Iraq so that they would know exactly when to run an 'anniversary' story. But all that data was sitting unused the rest of the time. It two weeks to build that data into what is now a public, searchable database called http://apps.washingtonpost.com/national/fallen/Faces of the Fallen
  11. “The biggest misnomer is that you have to be physically present in the room to listen to the social Web,"saysManish Mehta when I was last here to view the command center.
  12. Tracy/Hepburn movie The Desk Set which was made in 1957 and features the two stars who are conflicted about the computerization of a TV station’s research department. Of course, the computer depicted was the size of a room.