Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Business Value of Developer Relations: How and Why Technical Communities Are Key To Your Success

Buy

Discover the true value of Developer Relations as you learn to build and maintain positive relationships with your developer community. Use the principles laid out in this book to walk through your company goals and discover how you can formulate a plan tailored to your specific needs.

First you will understand the value of a technical community: why you need to foster a community and how to do it. Then you will learn how to be involved in community building on a daily basis: finding the right audience, walking the tightrope between representing the company and building a personal brand, in-person events, and more.

Featuring interviews with Developer Relations professionals from many successful companies including Red Hat, Google, Chef, Docker, Mozilla, SparkPost, Heroku, Twilio, CoreOS, and more, and with a foreword by Jono Bacon, The Business Value of Developer Relations is the perfect book for anyone who is working in the tech industry and wants to understand where DevRel is now and how to get involved. Don’t get left behind – join the community today.

What You’ll Learn

  • Define community and sell community to your company
  • Find, build, and engage with the community

  • Determine how and when to hire community managers

  • Build your own personal brand

Who This Book Is For

Any business leaders/owners/stakeholders in the tech industry, tech evangelists, community managers or developer advocates.



(HTML tags aren't allowed.)

IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Winning the Merger Endgame: A Playbook for Profiting From Industry Consolidation
Winning the Merger Endgame: A Playbook for Profiting From Industry Consolidation

No one begins playing a game without first knowing the basic rules. In the mergers and acquisitions game, however, it seems that there are no rules: movement is chaotic and the undisputed leader one day might be gone the next. Despite years of experience and intense due diligence by the most seasoned executives, knowing how and where to make the...

Management (with InfoTrac 1-Semester Printed Access Card)
Management (with InfoTrac 1-Semester Printed Access Card)

MANAGEMENT, 4th edition by Chuck Williams presents management theory and applications in an engaging narrative style that students will find both enjoyable and illuminating. Williams focuses on the most important management theories and concepts, enhancing and illustrating them with detailed examples and stories that pull students into the...


Jasmine JavaScript Testing
Jasmine JavaScript Testing

From a little renegade scripting language to the de facto standard platform of today, JavaScript has become a universal language available in the widest range of devices; it is truly the 'write once, run everywhere’ language. However, as JavaScript applications become more complicated, testing and applying sustainable software...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)

This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy