SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
BlogLevel and TweetLevel: a GPS for navigating influence ,[object Object],[object Object]
Used to identify who is influential on any specific topic First sort by context and relevance ...then analyze relevant people’s influence
Understanding the influential detailed analysis of blogger and tweeter
The science behind the tools based upon two pillars 1) Open, unique algorithm 2) The new influentials  BlogLevel ranks importance by how much a post is discussed on twitter, and how optimized the blog’s content is for search. TweetLevel ranks those who break news or are ‘idea starters’ higher than those who ‘amplify’ other people’s ideas. Extra weight given to those who are highly engaged. Influence is derived from how information flows between different people – this is known as the ‘Topology of Influence’.  Backed-up by the Web Science team at the University of Southampton, influential people can be: idea starters, amplifiers, curators, commentators or viewers.  People within thesedifferent categories allportray behavioralattributes that whencomplemented aremore likely to promotethe spread of a message.
For more information.... TweetLevel questions: tweetlevel@edelman.com BlogLevel questions: bloglevel@edelman.com Via twitter: @jonnybentwood Media inquiries: Marina.Mikus@edelman.com Thank you for using these tools --   we hope you find them valuable!
Introducing BlogLevel and TweetLevel

Contenu connexe

Plus de Edelman

Edelman DERT Trend Report - Nov '11
Edelman DERT Trend Report - Nov '11Edelman DERT Trend Report - Nov '11
Edelman DERT Trend Report - Nov '11Edelman
 
Edelman DERT Trend Report - Aug '11
Edelman DERT Trend Report - Aug '11Edelman DERT Trend Report - Aug '11
Edelman DERT Trend Report - Aug '11Edelman
 
Value, Trust and Engagement in an era of Social Entertainment
Value, Trust and Engagement in an era of Social Entertainment Value, Trust and Engagement in an era of Social Entertainment
Value, Trust and Engagement in an era of Social Entertainment Edelman
 
Five Years Of Dert Slide Show Slideshare Version
Five Years Of Dert Slide Show   Slideshare VersionFive Years Of Dert Slide Show   Slideshare Version
Five Years Of Dert Slide Show Slideshare VersionEdelman
 
Five Years of Edelman Trust in Entertainment
Five Years of Edelman Trust in Entertainment Five Years of Edelman Trust in Entertainment
Five Years of Edelman Trust in Entertainment Edelman
 
Orange Mobile Exposure 2010
Orange Mobile Exposure 2010Orange Mobile Exposure 2010
Orange Mobile Exposure 2010Edelman
 
Edelman Social Entertainment &Trust in the Entertainment Industry
Edelman Social Entertainment &Trust in the Entertainment Industry Edelman Social Entertainment &Trust in the Entertainment Industry
Edelman Social Entertainment &Trust in the Entertainment Industry Edelman
 

Plus de Edelman (7)

Edelman DERT Trend Report - Nov '11
Edelman DERT Trend Report - Nov '11Edelman DERT Trend Report - Nov '11
Edelman DERT Trend Report - Nov '11
 
Edelman DERT Trend Report - Aug '11
Edelman DERT Trend Report - Aug '11Edelman DERT Trend Report - Aug '11
Edelman DERT Trend Report - Aug '11
 
Value, Trust and Engagement in an era of Social Entertainment
Value, Trust and Engagement in an era of Social Entertainment Value, Trust and Engagement in an era of Social Entertainment
Value, Trust and Engagement in an era of Social Entertainment
 
Five Years Of Dert Slide Show Slideshare Version
Five Years Of Dert Slide Show   Slideshare VersionFive Years Of Dert Slide Show   Slideshare Version
Five Years Of Dert Slide Show Slideshare Version
 
Five Years of Edelman Trust in Entertainment
Five Years of Edelman Trust in Entertainment Five Years of Edelman Trust in Entertainment
Five Years of Edelman Trust in Entertainment
 
Orange Mobile Exposure 2010
Orange Mobile Exposure 2010Orange Mobile Exposure 2010
Orange Mobile Exposure 2010
 
Edelman Social Entertainment &Trust in the Entertainment Industry
Edelman Social Entertainment &Trust in the Entertainment Industry Edelman Social Entertainment &Trust in the Entertainment Industry
Edelman Social Entertainment &Trust in the Entertainment Industry
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Introducing BlogLevel and TweetLevel

  • 1.
  • 2. Used to identify who is influential on any specific topic First sort by context and relevance ...then analyze relevant people’s influence
  • 3. Understanding the influential detailed analysis of blogger and tweeter
  • 4. The science behind the tools based upon two pillars 1) Open, unique algorithm 2) The new influentials BlogLevel ranks importance by how much a post is discussed on twitter, and how optimized the blog’s content is for search. TweetLevel ranks those who break news or are ‘idea starters’ higher than those who ‘amplify’ other people’s ideas. Extra weight given to those who are highly engaged. Influence is derived from how information flows between different people – this is known as the ‘Topology of Influence’. Backed-up by the Web Science team at the University of Southampton, influential people can be: idea starters, amplifiers, curators, commentators or viewers. People within thesedifferent categories allportray behavioralattributes that whencomplemented aremore likely to promotethe spread of a message.
  • 5. For more information.... TweetLevel questions: tweetlevel@edelman.com BlogLevel questions: bloglevel@edelman.com Via twitter: @jonnybentwood Media inquiries: Marina.Mikus@edelman.com Thank you for using these tools -- we hope you find them valuable!