SlideShare a Scribd company logo
Dell Social Media Leadership
           Summit
          David Strom
       david@strom.com
       Twitter: @dstrom
My past editorial experience
Tech B2B Evolution
• Traditional print publishers dying
  (CMP/IDG/ZD/TT/Quinn) and can’t retool for
  online
• Traditional biz publishers can’t really cover
  tech in any depth
• Blogging model is shallow
• Google is go-to starting place for many in IT
• The rise of sponsored andcustom B2B pubs
US Army is a content machine!
                                         Total followers: 123,000
                                         Weekly tweets: 118



Total
followers: >1.1                          Total
million                                  subscribers:
Weekly users:     Total followers: 700   2600                  Total Followers: 650
19,000                                   Weekly videos
                                         posted: 5
Understand who is in your trenches
Keep evaluating
  these usage
   guidelines
  frequently!
Don’t be heavy-handed
Humor counts, too
Blogs are the
     core
 technology
    for any
social media
   strategy
Long form content is still relevant!
What do these have in common?
• Laptop bluetooth drivers
• Improvements in packaging
• Images showing how to replace your battery
  on Dell.com
• Better quality of laptop speakers
Encourage real
conversations
Please use the comments to demonstrate your
  own ignorance, unfamiliarity with empirical
  data, ability to repeat discredited memes,
  and lack of respect for scientific knowledge.
  Also, be sure to create straw men and argue
  against things I have neither said nor even
  implied. Any irrelevancies you can mention
  will also be appreciated. Lastly, kindly forgo
  all civility in your discourse . . . you are, after
  all, anonymous.
Adrian Holovaty’s definition of
              journalism
• Gathering information,
• Distilling that information and
• Presenting it.
Dell social media
Dell social media
Dell social media

More Related Content

Similar to Dell social media

Diana Plazas: Global Brand Share
Diana Plazas: Global Brand ShareDiana Plazas: Global Brand Share
Diana Plazas: Global Brand Share
Expion
 
Tools and Strategies for Social Businesses
Tools and Strategies for Social BusinessesTools and Strategies for Social Businesses
Tools and Strategies for Social Businesses
JD Lasica
 
Social Media, A Brief Introduction
Social Media, A Brief IntroductionSocial Media, A Brief Introduction
Social Media, A Brief Introduction
Alex de Carvalho
 
Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike Freeman
 
Social Media Plymouth
Social Media PlymouthSocial Media Plymouth
Social Media Plymouth
Get up to Speed
 
Social Media Overview: June 2012
Social Media Overview: June 2012Social Media Overview: June 2012
Social Media Overview: June 2012
Sociabull
 
How donuts can help you communicate in an online world
How donuts can help you communicate in an online world How donuts can help you communicate in an online world
How donuts can help you communicate in an online world
George Hulbert
 
Social media Workshop RDJ + Pixelbar
Social media Workshop RDJ + PixelbarSocial media Workshop RDJ + Pixelbar
Social media Workshop RDJ + Pixelbar
Gino Cremer
 
Digital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community NewsDigital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community News
Steve Buttry
 
Building and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social WebBuilding and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social Web
lisbk
 
Twitter
TwitterTwitter
Twitter
SpiderDigital
 
Social media workshop
Social media workshopSocial media workshop
Social media workshop
DigiArabs
 
Twitter for Journalists
Twitter for JournalistsTwitter for Journalists
Twitter for Journalists
Kathy Gill
 
Twitter for business
Twitter for businessTwitter for business
Twitter for business
Eoin Kennedy
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!
AfricanCommonsProject
 
Social Media Strategy & Facebook
Social Media Strategy & FacebookSocial Media Strategy & Facebook
Social Media Strategy & Facebook
Own. Bought. Earned.
 
Threadless + crowdsourcing
Threadless + crowdsourcingThreadless + crowdsourcing
Threadless + crowdsourcingLalit Chopra
 
Driving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid EventDriving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid Event
Spotlight Communications
 
War child social media presentation
War child social media presentationWar child social media presentation
War child social media presentation
alysonlou
 

Similar to Dell social media (20)

Diana Plazas: Global Brand Share
Diana Plazas: Global Brand ShareDiana Plazas: Global Brand Share
Diana Plazas: Global Brand Share
 
Tools and Strategies for Social Businesses
Tools and Strategies for Social BusinessesTools and Strategies for Social Businesses
Tools and Strategies for Social Businesses
 
Social Media, A Brief Introduction
Social Media, A Brief IntroductionSocial Media, A Brief Introduction
Social Media, A Brief Introduction
 
Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12Mike freeman presentation 11 19 12
Mike freeman presentation 11 19 12
 
Social Media Plymouth
Social Media PlymouthSocial Media Plymouth
Social Media Plymouth
 
Social Media Overview: June 2012
Social Media Overview: June 2012Social Media Overview: June 2012
Social Media Overview: June 2012
 
How donuts can help you communicate in an online world
How donuts can help you communicate in an online world How donuts can help you communicate in an online world
How donuts can help you communicate in an online world
 
Social media Workshop RDJ + Pixelbar
Social media Workshop RDJ + PixelbarSocial media Workshop RDJ + Pixelbar
Social media Workshop RDJ + Pixelbar
 
Digital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community NewsDigital Challenges and Opportunities in Community News
Digital Challenges and Opportunities in Community News
 
Building and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social WebBuilding and Sustaining a Community using the Social Web
Building and Sustaining a Community using the Social Web
 
Twitter
TwitterTwitter
Twitter
 
Social media workshop
Social media workshopSocial media workshop
Social media workshop
 
Twitter for Journalists
Twitter for JournalistsTwitter for Journalists
Twitter for Journalists
 
Twitter for business
Twitter for businessTwitter for business
Twitter for business
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!
 
Social Media Strategy & Facebook
Social Media Strategy & FacebookSocial Media Strategy & Facebook
Social Media Strategy & Facebook
 
Threadless + crowdsourcing
Threadless + crowdsourcingThreadless + crowdsourcing
Threadless + crowdsourcing
 
Driving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid EventDriving Social Media Traffic to Your Hybrid Event
Driving Social Media Traffic to Your Hybrid Event
 
War child social media presentation
War child social media presentationWar child social media presentation
War child social media presentation
 
Productivity Apps
Productivity AppsProductivity Apps
Productivity Apps
 

More from David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
David Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
David Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
David Strom
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
David Strom
 

More from David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Dell social media

  • 1. Dell Social Media Leadership Summit David Strom david@strom.com Twitter: @dstrom
  • 2. My past editorial experience
  • 3. Tech B2B Evolution • Traditional print publishers dying (CMP/IDG/ZD/TT/Quinn) and can’t retool for online • Traditional biz publishers can’t really cover tech in any depth • Blogging model is shallow • Google is go-to starting place for many in IT • The rise of sponsored andcustom B2B pubs
  • 4. US Army is a content machine! Total followers: 123,000 Weekly tweets: 118 Total followers: >1.1 Total million subscribers: Weekly users: Total followers: 700 2600 Total Followers: 650 19,000 Weekly videos posted: 5
  • 5. Understand who is in your trenches
  • 6. Keep evaluating these usage guidelines frequently!
  • 7.
  • 10. Blogs are the core technology for any social media strategy
  • 11. Long form content is still relevant!
  • 12. What do these have in common? • Laptop bluetooth drivers • Improvements in packaging • Images showing how to replace your battery on Dell.com • Better quality of laptop speakers
  • 14. Please use the comments to demonstrate your own ignorance, unfamiliarity with empirical data, ability to repeat discredited memes, and lack of respect for scientific knowledge. Also, be sure to create straw men and argue against things I have neither said nor even implied. Any irrelevancies you can mention will also be appreciated. Lastly, kindly forgo all civility in your discourse . . . you are, after all, anonymous.
  • 15. Adrian Holovaty’s definition of journalism • Gathering information, • Distilling that information and • Presenting it.

Editor's Notes

  1. They are a content machine. Each week they coordinate the posts on their various social media properties and there is plenty of fresh content. Any social media strategy needs to be based on terrific content, and regular infusions of it. They have this one covered, in spades.
  2. Leadership is essential. The Army’s efforts are led by Major Juanita Chang who is the Director, Online and Social Media Division for the past two years in the Army’s Office of the Chief of Public Affairs. Chang is a career soldier who has been in active duty since 1996 and served at one point as a chemical weapons officer before she got into PR. Having someone who came up through the ranks is key, because they can emphasize with the boots on the ground and know the entire Army ecosystem too. When you pick your social media team leader, keep this in mind.
  3. Take a look at some others here:http://socialmediagovernance.com/policies.php#axzz1nOhG6cnjwhat happens when an individual comes to Dell with an existing Twitter account, and how this account is treated when they leave the company.
  4. http://www.youtube.com/watch?v=8iQLkt5CG8IThis is a 4min. video from an Australian government agency about social media policy.
  5. The guidelines are all common sense and not what you would expect from an organization that believes in the chain of command. “If we can trust our soldiers with guns and grenades, why can’t we trust them with Facebook?” This is from an Army handbook that was posted on Slideshare.netKNOW WHAT YOUR AUDIENCE NEEDS!
  6. NOT THIS CORE TECH -- I know in our rush to embrace all that is new we tend to forget about the old, but blogging is still important and can cement the other social media pieces
  7. This was a four page article that got a total of 35k views on 12/28, and was a redo too! It was a fairly geeky report from the F8 developers conference.
  8. All were as the result of various social media feedback on various forums – tightening the feedback loop between Dell and its customers
  9. http://www.ritholtz.com/blog/, Barry Ritholtz, a financial journalist and speaker
  10. While working at the Washington Post, Adrian Holovaty discovered that reporters were keeping a detailed database of soldiers killed in Iraq so that they would know exactly when to run an 'anniversary' story. But all that data was sitting unused the rest of the time. It two weeks to build that data into what is now a public, searchable database called http://apps.washingtonpost.com/national/fallen/Faces of the Fallen
  11. “The biggest misnomer is that you have to be physically present in the room to listen to the social Web,"saysManish Mehta when I was last here to view the command center.
  12. Tracy/Hepburn movie The Desk Set which was made in 1957 and features the two stars who are conflicted about the computerization of a TV station’s research department. Of course, the computer depicted was the size of a room.