Skip to main content

Study: What inspires innovators on Twitter | Articles | Home

xxx

The top 10 accounts that innovators follow are:

1. Richard Branson (@richardbranson), founder of Virgin Group

2. Marc Andreessen (@pmarca), entrepreneur, investor and software engineer

3. Benedict Evans (@benedictevans), partner at Andreessen Horowitz

4. Glen Gilmore (@GlenGilmore), attorney and principle of Gilmore Business Network

5. Scott Kirsner (@ScottKirsner), Boston Globe columnist, and editor of Innovation Leader

6. Henry Blodget (@hblodget), editor, founder and CEO of Business Insider

7. Bill Gates (@BillGates), co-founder of Microsoft

8. Andrew McAfee (@amcafee), director of the Center for Digital Business at MIT’s Sloan School of Management

9. Sam Maule (@sammaule), manager at Carlisle & Gallagher Consulting Group and chief inspiration officer at Digital Finance Institute

10. David Birch (@dgwbirch), author and Consult Hyperion’s director

The top 10 publications from which innovators share content include YouTube, Forbes, Harvard Business Review, TechCrunch, The New York Times, Instagram, LinkedIn, The Wall Street Journal, Fast Company and Twitter.

From Study: What inspires innovators on Twitter | Articles | Home

xxx

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...