vmworld OR vmware, Twitter, 12/24/2021 2:55:02 AM, 268916


FAQ | Problem?

vmworld OR vmware_2021-12-23_18-24-08.xlsx
vmworld OR vmware_2021-12-23_18-24-08.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
December 24, 2021
Short Description:
vmworld OR vmware via NodeXL https://bit.ly/3mxmERk
@vmware
@campuscodi
@ebiebi_pg
@mitsuki_shirase
@jangari_ntk
@vmwaretanzu
@bleepincomputer
@ionut_ilascu
@botcybersec
@cybersec_feeds

Top hashtags:
#vmware
#log4j
#log4shell
#cybersecurity
#vexpert
#cloud
#infosec

Description:
Description
The graph represents a network of 4,823 Twitter users whose tweets in the requested range contained "vmworld OR vmware", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Friday, 24 December 2021 at 02:41 UTC.

The requested start date was Friday, 24 December 2021 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 5-day, 12-hour, 8-minute period from Tuesday, 14 December 2021 at 20:30 UTC to Monday, 20 December 2021 at 08:38 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4823
Unique Edges : 4183
Edges With Duplicates : 10127
Total Edges : 14310
Number of Edge Types : 5
Retweet : 3456
MentionsInRetweet : 5055
Tweet : 2932
Mentions : 2377
Replies to : 490
Self-Loops : 2984
Reciprocated Vertex Pair Ratio : 0.0336879432624113
Reciprocated Edge Ratio : 0.065180102915952
Connected Components : 1228
Single-Vertex Connected Components : 938
Maximum Vertices in a Connected Component : 3098
Maximum Edges in a Connected Component : 11752
Maximum Geodesic Distance (Diameter) : 14
Average Geodesic Distance : 4.604515
Graph Density : 0.000275750794207866
Modularity : 0.398705
NodeXL Version : 1.0.1.447
Data Import : The graph represents a network of 4,823 Twitter users whose tweets in the requested range contained "vmworld OR vmware", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Friday, 24 December 2021 at 02:41 UTC.

The requested start date was Friday, 24 December 2021 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 5-day, 12-hour, 8-minute period from Tuesday, 14 December 2021 at 20:30 UTC to Monday, 20 December 2021 at 08:38 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : vmworld OR vmware
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[230] https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers/
[112] https://www.youtube.com/watch?v=oqgaK6hsZUM&feature=youtu.be

[105] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[53] https://www.vmware.com/security/advisories/VMSA-2021-0028.html
[52] https://blogs.vmware.com/vexpert/2021/12/19/12-days-of-kubernetes/
[41] https://www.bleepingcomputer.com/news/security/cisa-urges-vmware-admins-to-patch-critical-flaw-in-workspace-one-uem/
[36] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/
[32] https://williamlam.com/2021/12/vmware-event-broker-appliance-veba-v0-7-1.html
[28] https://github.com/BinaryDefense/log4j-honeypot-flask
[27] https://www.securityweek.com/vmware-patches-critical-flaw-workspace-one-uem-console

Top URLs in Tweet in G1:
[30] https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers/
[17] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[16] https://www.sesin.at/
[13] https://azure.microsoft.com/en-us/updates/placement-polices-now-available-for-azure-vmware-solution/
[11] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/
[10] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/
[10] https://www.cisa.gov/uscert/ncas/current-activity/2021/12/17/vmware-releases-security-advisory
[10] https://www.bleepingcomputer.com/news/security/cisa-urges-vmware-admins-to-patch-critical-flaw-in-workspace-one-uem/
[9] https://www.securityweek.com/vmware-patches-critical-flaw-workspace-one-uem-console
[8] https://twinybots.ch/

Top URLs in Tweet in G2:
[31] https://williamlam.com/2021/12/vmware-event-broker-appliance-veba-v0-7-1.html
[31] https://www.vmware.com/security/advisories/VMSA-2021-0028.html
[26] https://blogs.vmware.com/vexpert/2021/12/19/12-days-of-kubernetes/
[12] https://blogs.vmware.com/management/2021/12/vexpert-cloud-management-november-2021-blog-digest.html
[11] https://blogs.vmware.com/management/2021/12/detecting-log4j-bad-actor-connections-with-vrealize-network-insight.html
[10] https://advocacy.vmware.com/Article/Redirect/353bce86-3a80-4bf6-8414-eb6de84c0c98?uc=414&g=6c4e9d2b-2f92-438e-9150-4b4f58d3ba5f&f=2777346
[8] https://advocacy.vmware.com/Article/Redirect/353bce86-3a80-4bf6-8414-eb6de84c0c98?uc=414&g=763f38ea-f0c0-44d2-b2ec-e503d85f71ca&f=2778474
[8] https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/rn/vmware-nsxt-data-center-32-release-notes/index.html
[5] https://blogs.vmware.com/vexpert/2021/12/07/vexpert-2022-applications-are-open/
[5] https://news.vmware.com/company/vmware-new-york-stock-exchange-bell

Top URLs in Tweet in G3:
[22] https://youtu.be/cj8h3RBPn0A
[21] https://twitter.com/i/broadcasts/1ypJdEymyoVxW
[20] https://blogs.vmware.com/vexpert/2021/12/19/12-days-of-kubernetes/
[16] https://news.vmware.com/company/vmware-new-york-stock-exchange-bell
[8] http://tanzucommunityedition.io/
[8] https://tanzu.vmware.com/application-platform
[7] https://eddiejaoude.krtra.com/t/udJv2w1DLFdT
[6] https://news.vmware.com/releases/vmworld-2021-modern-apps
[5] https://www.wwt.com/article/vmware-tanzu-community-edition-highlights
[5] https://www.eddiejaoude.io/front/domain_validation?step=1&domain=www.eddiejaoude.io&url=https%3A%2F%2Fwww.eddiejaoude.io%2Fblog-december-2021-vmware-tanzu

Top URLs in Tweet in G4:
[133] https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers/
[28] https://github.com/BinaryDefense/log4j-honeypot-flask
[20] https://www.bleepingcomputer.com/news/security/cisa-urges-vmware-admins-to-patch-critical-flaw-in-workspace-one-uem/
[5] https://okt.to/1sZNlT
[4] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/
[4] https://docs.vmware.com/en/Unified-Access-Gateway/2111.1/rn/unified-access-gateway-21111-release-notes/index.html
[3] https://www.vmware.com/security/advisories/VMSA-2021-0028.html
[3] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[2] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/
[2] https://twitter.com/BleepinComputer/status/1471911235138510865

Top URLs in Tweet in G5:
[106] https://www.youtube.com/watch?v=oqgaK6hsZUM&feature=youtu.be

[55] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[45] https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers/
[15] https://blogs.vmware.com/security/2021/12/investigating-cve-2021-44228-log4shell-vulnerability.html
[10] https://www.securityweek.com/vmware-patches-critical-flaw-workspace-one-uem-console
[9] http://cyberiqs.com/latestnews
[8] https://www.threatshub.org/blog/over-log4j-vmware-has-another-critical-flaw-for-you-to-patch/
[8] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/
[8] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/#ftag=RSSbaffb68
[7] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/#ftag=RSSbaffb68

Top URLs in Tweet in G6:
[7] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/
[7] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/?ftag=COS-05-10aaa0g&taid=61bd47b25bce710001efc8ba&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[7] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/?ftag=COS-05-10aaa0g&taid=61be414c92a8110001a44931&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[7] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/?ftag=COS-05-10aaa0g&taid=61beb8d15bce710001eff69c&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[6] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/?ftag=COS-05-10aaa0g&taid=61bd55bc92a8110001a423f2&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[6] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/?ftag=COS-05-10aaa0g&taid=61bdbf4cf25af2000197a0a8&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[6] https://www.linkedin.com/slink?code=g4mUdXvm
[5] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/?ftag=COS-05-10aaa0g&taid=61bcc922f25af2000197780b&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[5] https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/?ftag=COS-05-10aaa0g&taid=61be05885bce710001efe468&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[5] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/?ftag=COS-05-10aaa0g&taid=61be1011f25af2000197aae1&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter

Top URLs in Tweet in G7:
[17] https://www.youtube.com/watch?v=5nGLH4bijF0&feature=youtu.be

[6] https://azure.microsoft.com/en-us/updates/placement-polices-now-available-for-azure-vmware-solution/
[4] https://thectoadvisor.com/bryan-liles/
[4] https://azure.microsoft.com/en-gb/updates/placement-polices-now-available-for-azure-vmware-solution/?utm_content=buffer52871&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[3] https://azure.microsoft.com/en-us/updates/placement-polices-now-available-for-azure-vmware-solution/?WT.mc_id=AZ-MVP-5001832
[2] https://thejavasea.com/threads/i-bought-a-new-server-vmware-esxi-setup-and-install.5897/
[2] https://my.vmworld.com/scripts/catalog/uscatalog.jsp?search=LHC2802BU&showEnrolled=false&cm_mc_uid=14032638472015033524514&cm_mc_sid_50200000=1503440389
[1] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[1] https://www.theregister.com/2021/12/20/in_brief_security/
[1] https://www.einnews.com/pr_news/558621690/storage-in-big-data-market-grow-at-a-cagr-of-20-4-forecast-to-2027-memsql-inc-vmware-inc-sap-se-dell-emc

Top URLs in Tweet in G8:
[11] https://www.theregister.com/2021/12/17/vmware_criticial_uem_flaw/
[6] https://media.cert.europa.eu/static/SecurityAdvisories/2021/CERT-EU-SA2021-075.pdf
[2] https://therecord.media/conti-ransomware-group-adopts-log4shell-exploit/
[2] https://securityonline.info/cve-2021-44228-vulnerability-affects-multiple-vmware-products/
[1] https://www.zdnet.com/article/vmware-patches-critical-non-log4j-flaw-as-ibm-cisco-release-log4j-fixes/?ftag=COS-05-10aaa0g&taid=61be4f5df25af2000197b23f&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[1] https://windows.developpez.com/actu/328983/Microsoft-a-discretement-sorti-une-version-test-de-machine-virtuelle-Windows-11-Entreprise-pour-les-developpeurs-preparee-en-fonction-de-VMWare-Hyper-V-VirtualBox-et-Parallels/?utm_source=dlvr.it&utm_medium=twitter
[1] https://www.bleepingcomputer.com/news/security/cisa-urges-vmware-admins-to-patch-critical-flaw-in-workspace-one-uem/
[1] https://www.vmware.com/security/advisories/VMSA-2021-0028.html
[1] https://www.securityweek.com/vmware-patches-critical-flaw-workspace-one-uem-console
[1] https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers/

Top URLs in Tweet in G9:
[15] https://flings.vmware.com/esxi-arm-edition#changelog
[7] https://sky-joker.tech/2021/12/15/molecule%e3%81%a8vcenter-simulator%e3%82%92%e9%80%a3%e6%90%ba%e3%81%97%e3%81%9f%e3%83%86%e3%82%b9%e3%83%88%e3%82%92%e3%81%99%e3%82%8b/
[5] https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/rn/vmware-nsxt-data-center-32-release-notes/index.html
[4] https://kb.vmware.com/s/article/87096
[3] https://vmware.connpass.com/event/232239/
[2] https://docs.vmware.com/en/VMware-NSX-Intelligence/3.2/rn/vmware-nsx-intelligence-32-release-notes/index.html
[2] https://www.vmware.com/security/advisories/VMSA-2021-0028.html
[2] https://twitter.com/ebiebi_pg/status/1470876367613214726
[1] https://lab8010.com/dell-emc-powerprotect-dd-ve-install-initial-setup/?linkId=144668553
[1] https://customerconnect.vmware.com/ja/downloads/details?downloadGroup=NSX-T-320&productId=982&rPId=61452

Top URLs in Tweet in G10:
[5] https://my.vmug.com/s/community-event?id=a1Y4x0000002401EAA
[4] https://kb.vmware.com/s/article/87081
[4] https://www.linkedin.com/slink?code=eyGwmjy3
[3] https://vmexplorer.com/home-labs-a-definitive-guide/
[2] https://podcasts.apple.com/nl/podcast/in-de-aap-gelogeerd-met-duncan-frank-en-johan/id1577252333?i=1000545469309
[2] https://open.spotify.com/episode/1IaOM90xaBVT343zvzgOzS?si=5W0mqXM4SLqGKDtyKZ9kGA
[2] https://www.youtube.com/watch?v=jeEcNi53PDM&feature=youtu.be

[2] https://advocacy.vmware.com/Article/Redirect/0782938e-62ba-4def-bf83-147576000f63?uc=93493&g=0a1c0941-8b68-41a3-8947-948935be3bfe&f=2778971
[2] https://www.viktorious.nl/2021/12/13/vmugnl-speaking-engagement-from-idea-to-production-with-vmware-tanzu/
[1] https://twitter.com/jeffreykusters/status/1471470733322854401

Top Domains
Top Domains in Tweet in Entire Graph:
[1746] vmware.com
[312] bleepingcomputer.com
[200] youtube.com
[171] zdnet.com
[155] theregister.com
[129] twitter.com
[94] linkedin.com
[61] microsoft.com
[52] github.com
[50] nolabnoparty.com

Top Domains in Tweet in G1:
[380] vmware.com
[53] bleepingcomputer.com
[52] linkedin.com
[41] theregister.com
[38] zdnet.com
[33] microsoft.com
[32] sesin.at
[25] twitter.com
[17] securityweek.com
[15] typeshukatsu.jp

Top Domains in Tweet in G2:
[379] vmware.com
[32] williamlam.com
[20] twitter.com
[16] youtube.com
[16] forbes.com
[10] hpe.com
[8] angrysysops.com
[7] credly.com
[7] megaport.com
[6] webinar.net

Top Domains in Tweet in G3:
[441] vmware.com
[29] twitter.com
[27] youtu.be
[8] itechnologyseries.com
[8] williamlam.com
[8] tanzucommunityedition.io
[7] wwt.com
[7] krtra.com
[6] opsmatters.com
[6] youtube.com

Top Domains in Tweet in G4:
[154] bleepingcomputer.com
[31] github.com
[15] vmware.com
[6] zdnet.com
[6] twitter.com
[6] okt.to
[3] attackerkb.com
[3] theregister.com
[1] therecord.media
[1] advintel.io

Top Domains in Tweet in G5:
[114] youtube.com
[85] vmware.com
[73] theregister.com
[53] bleepingcomputer.com
[29] zdnet.com
[12] vembu.com
[11] securityweek.com
[11] cyberiqs.com
[8] threatshub.org
[8] securityaffairs.co

Top Domains in Tweet in G6:
[119] vmware.com
[83] zdnet.com
[16] linkedin.com
[10] youtube.com
[6] twitter.com
[6] sdx.io
[5] radian6.com
[4] delltechnologies.com
[3] bleepingcomputer.com
[3] youtu.be

Top Domains in Tweet in G7:
[28] vmware.com
[18] youtube.com
[13] microsoft.com
[4] thectoadvisor.com
[2] theregister.com
[2] thejavasea.com
[2] vmworld.com
[1] einnews.com
[1] coevolve.com
[1] youtu.be

Top Domains in Tweet in G8:
[11] theregister.com
[6] europa.eu
[2] therecord.media
[2] bleepingcomputer.com
[2] securityonline.info
[1] zdnet.com
[1] developpez.com
[1] vmware.com
[1] securityweek.com

Top Domains in Tweet in G9:
[34] vmware.com
[7] sky-joker.tech
[4] twitter.com
[3] connpass.com
[2] virtualg.uk
[1] lab8010.com
[1] microsoft.com
[1] williamlam.com
[1] qiita.com
[1] avinetworks.com

Top Domains in Tweet in G10:
[17] vmware.com
[10] twitter.com
[6] linkedin.com
[5] dy.si
[5] vmug.com
[4] github.com
[3] youtube.com
[3] vmexplorer.com
[2] netapp.com
[2] apple.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[993] vmware
[312] log4j
[252] log4shell
[197] cybersecurity
[180] vexpert
[161] cloud
[139] infosec
[124] ransomware
[108] security
[93] 12daysofk8s



Top Hashtags in Tweet in G1:
[184] vmware
[29] log4j
[28] security
[22] igel
[21] cloud
[21] cybersecurity
[15] 23卒
[14] microsoft
[14] linux
[13] ubuntu

Top Hashtags in Tweet in G2:
[136] vmware
[72] vexpert
[53] log4j
[47] 12daysofk8s
[28] vmware_devops
[26] nsx
[25] sdwan
[25] cloud
[18] security
[16] kubernetes

Top Hashtags in Tweet in G3:
[107] vmware
[59] kubernetes
[37] 12daysofk8s
[32] tanzu
[31] vexpert
[22] cloud
[22] vmwaretam
[18] vcommunity
[15] vsphere
[14] log4j

Top Hashtags in Tweet in G4:
[88] log4shell
[75] vmware
[17] log4j
[14] horizon
[6] vcenter
[5] cybersecurity
[5] ransomware
[3] infosec
[3] hacking
[2] computersecurity

Top Hashtags in Tweet in G5:
[161] vmware
[150] cybersecurity
[113] infosec
[81] ransomware
[56] log4j
[53] conti
[52] log4shell
[50] 100daysofcode
[43] cyberattack
[41] security

Top Hashtags in Tweet in G6:
[64] vmware
[37] workspaceone
[23] cloud
[17] vmworld
[15] anywhereworkspace
[12] vmwonaws
[11] log4j
[11] blockchain
[11] delltech
[10] vmwarepartners

Top Hashtags in Tweet in G7:
[23] vmware
[17] azure
[17] 5g
[17] nokia
[9] cloud
[4] digitaltransformation
[4] digital
[4] microsoft
[4] ai
[3] bigdata

Top Hashtags in Tweet in G8:
[7] vmware
[4] log4shell
[3] log4j
[2] microsoft
[2] windows
[2] développeurs
[2] ransomware
[1] horizon
[1] infosec
[1] pentest

Top Hashtags in Tweet in G9:
[9] vmware
[7] ansiblejp
[2] nsxt
[2] avi
[2] nsxalb
[2] vmware_devops
[1] 自宅ラボ
[1] geneve
[1] ndr
[1] qiita

Top Hashtags in Tweet in G10:
[31] vmware
[16] log4j
[9] vmug
[9] doscember
[8] itqlife
[7] vmugnl
[7] aws
[7] vexpert
[7] tas
[6] nlvmug

Top Words
Top Words in Tweet in Entire Graph:
[4813] vmware
[989] #vmware
[916] log4j
[773] ransomware
[765] vcenter
[753] cloud
[665] conti
[634] 2021
[610] servers
[586] more

Top Words in Tweet in G1:
[943] vmware
[184] #vmware
[170] cloud
[153] log4j
[141] one
[135] 2021
[127] workspace
[113] flaw
[108] critical
[101] ransomware

Top Words in Tweet in G2:
[796] vmware
[177] cloud
[159] more
[141] 2021
[137] #vmware
[116] learn
[94] vexpert
[87] nsx
[78] blog
[76] kubernetes

Top Words in Tweet in G3:
[442] vmware
[149] tanzu
[141] nyse
[130] vmwaretanzu
[123] kubernetes
[122] more
[116] cloud
[106] #vmware
[97] raghuraghuram
[87] company

Top Words in Tweet in G4:
[249] vmware
[208] vcenter
[199] ransomware
[196] log4j
[194] conti
[178] servers
[165] bleepincomputer
[157] bug
[154] hack
[144] ionut_ilascu

Top Words in Tweet in G5:
[492] vmware
[170] log4j
[161] #vmware
[150] #cybersecurity
[149] flaw
[147] critical
[119] ransomware
[113] #infosec
[110] vcenter
[108] metal

Top Words in Tweet in G6:
[346] vmware
[108] log4j
[103] ransomware
[82] more
[81] cloud
[68] zdnet
[64] #vmware
[55] servers
[54] conti
[50] china

Top Words in Tweet in G7:
[109] vmware
[44] cloud
[38] ctoadvisor
[23] azure
[23] #vmware
[18] nokia
[17] solution
[17] #azure
[17] partnering
[17] native

Top Words in Tweet in G8:
[169] vmware
[148] conti
[148] vcenter
[145] ransomware
[145] servers
[143] log4shell
[142] group
[142] exploit
[141] campuscodi
[141] using

Top Words in Tweet in G9:
[118] ebiebi_pg
[118] twitterのフォロワーさんが
[118] エンジニアなら自宅に開発用のサーバくらいあるでしょー
[118] みたいな事言ってたから
[118] やっぱみんな持っているんだなぁ
[118] って信じていたのですが
[118] 自宅サーバ派はやっぱり少数派
[118] という事が分かりました
[117] 自宅サーバに
[17] vmware

Top Words in Tweet in G10:
[112] vmware
[31] #vmware
[30] 2021
[28] met
[28] cloud
[26] vswitchzero
[23] vmugnl
[21] sessie
[19] community
[19] netapp

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[589] vmware,vcenter
[580] conti,ransomware
[481] vcenter,servers
[330] workspace,one
[299] log4j,bug
[298] bug,hack
[271] uses,log4j
[269] one,uem
[267] hack,vmware
[264] cve,2021

Top Word Pairs in Tweet in G1:
[122] workspace,one
[88] one,uem
[69] conti,ransomware
[65] critical,flaw
[64] vmware,vcenter
[44] sd,wan
[44] log4j,bug
[44] uem,console
[44] vcenter,servers
[44] bug,hack

Top Word Pairs in Tweet in G2:
[49] cve,2021
[47] learn,more
[41] 2021,44228
[39] multi,cloud
[36] applications,open
[34] data,center
[33] 2022,applications
[32] vmware,cloud
[31] event,broker
[31] broker,appliance

Top Word Pairs in Tweet in G3:
[101] vmware,tanzu
[66] company,once
[50] community,edition
[43] bell,nyse
[42] great,ring
[42] ring,bell
[42] standalone,company
[41] nyse,today
[41] today,marking
[41] marking,stature

Top Word Pairs in Tweet in G4:
[182] vmware,vcenter
[176] conti,ransomware
[171] vcenter,servers
[156] log4j,bug
[154] bug,hack
[154] hack,vmware
[134] uses,log4j
[132] ransomware,uses
[129] servers,ionut_ilascu
[128] bleepincomputer,conti

Top Word Pairs in Tweet in G5:
[108] critical,flaw
[106] installation,okd
[106] okd,openshift
[106] openshift,vmware
[106] vmware,bare
[106] bare,metal
[106] metal,user
[106] user,provisioned
[106] provisioned,infrastructure
[106] infrastructure,upi

Top Word Pairs in Tweet in G6:
[53] conti,ransomware
[49] tellyouthepass,ransomware
[48] log4j,conti
[48] ransomware,attacking
[48] attacking,vmware
[48] vmware,servers
[48] servers,tellyouthepass
[48] ransomware,hits
[48] hits,china
[42] zdnet,log4j

Top Word Pairs in Tweet in G7:
[17] nokia,#vmware
[17] #vmware,partnering
[17] partnering,cloud
[17] cloud,native
[17] native,transformation
[17] transformation,velocity
[17] velocity,#5g
[17] #5g,nok
[17] nok,#nokia
[17] #nokia,vmw

Top Word Pairs in Tweet in G8:
[146] vmware,vcenter
[145] conti,ransomware
[145] vcenter,servers
[141] log4shell,exploit
[140] ransomware,group
[140] group,adopted
[140] adopted,log4shell
[140] exploit,currently
[140] currently,using
[140] using,target

Top Word Pairs in Tweet in G9:
[118] twitterのフォロワーさんが,エンジニアなら自宅に開発用のサーバくらいあるでしょー
[118] エンジニアなら自宅に開発用のサーバくらいあるでしょー,みたいな事言ってたから
[118] みたいな事言ってたから,やっぱみんな持っているんだなぁ
[118] やっぱみんな持っているんだなぁ,って信じていたのですが
[118] って信じていたのですが,自宅サーバ派はやっぱり少数派
[118] 自宅サーバ派はやっぱり少数派,という事が分かりました
[117] ebiebi_pg,twitterのフォロワーさんが
[117] という事が分かりました,自宅サーバに
[15] v1,update
[15] update,fling

Top Word Pairs in Tweet in G10:
[17] vswitchzero,vmware
[14] cve,2021
[13] digitalcloudgal,kierra_summer
[13] kierra_summer,scorpvayne
[13] scorpvayne,adanielhill
[13] adanielhill,gabsmashh
[12] usercon,2021
[12] 2021,44228
[11] vmugnl,mestredelpino
[11] mestredelpino,presenting

Top Replied-To
Top Replied-To in Entire Graph:
@vmware_japan
@ctoadvisor
@vmware
@vswitchzero
@vmiss33
@entapprepo
@michaeldell
@raghuraghuram
@senthenes
@g0ldingkev

Top Replied-To in G1:
@bottingkruger

Top Replied-To in G2:
@vmware
@fdlsistemi
@rinkiyakedad
@forbes
@sunny_dua
@virtualjad
@vgarethlewis
@gr8n8tr0n
@smitmartijn
@shankmohan

Top Replied-To in G3:
@michaeldell
@raghuraghuram
@vmware
@sumit_dhawan
@nyse
@vmwaretanzu
@drfsim
@eddiejaoude
@k00laidit
@vmwarecxs

Top Replied-To in G4:
@bleepincomputer
@cl
@ionut_ilascu
@likethecoins
@sampsonkerry
@vk_intel
@junior_baines

Top Replied-To in G5:
@appenz
@banesec
@lubah

Top Replied-To in G6:
@steiner_matthew
@jakerobinson
@vmw_carbonblack
@leecaswell
@vmwarein
@bharatt00290221
@ncci
@markgabbs
@ccie5851
@m0bilej0n

Top Replied-To in G7:
@ctoadvisor
@quinnypig
@hyounpark
@billmew
@dhinchcliffe
@robertsirc
@otherscottlowe
@cerebreate
@joelinthecloud
@nambrosebarry

Top Replied-To in G8:
@campuscodi

Top Replied-To in G9:
@onvmware
@jessfraz
@princepopi
@ebiebi_pg

Top Replied-To in G10:
@vswitchzero
@senthenes
@vmexplorer
@unclemikeretro
@jeffreykusters
@illyrian598
@digitalcloudgal
@yoliveau
@phillipwylie
@sidneymiller2

Top Mentioned
Top Mentioned in Entire Graph:
@vmware
@vmwaretanzu
@bleepincomputer
@campuscodi
@nyse
@ionut_ilascu
@raghuraghuram
@ebiebi_pg
@prashanth_ns
@vexpert

Top Mentioned in G1:
@linuxsc
@bobby_gratz
@proofandedit
@ekonomiknokta
@accelstor
@nishasi39212076
@write_jobs
@hostingjournal

Top Mentioned in G2:
@vmware
@vexpert
@lamw
@vmweventbroker
@raghuraghuram
@vmwarensx
@vmwaresrc
@kitcolbert
@vmwaretanzu
@vmwarehorizon

Top Mentioned in G3:
@vmware
@vmwaretanzu
@nyse
@raghuraghuram
@sumit_dhawan
@vmwmarketplace
@cloudianstorage
@ezzeldinhussein
@awsreinvent
@techadvoguy

Top Mentioned in G4:
@bleepincomputer
@ionut_ilascu
@1zrr4h
@rpargman
@nakashimae
@serghei
@attackerkb
@campuscodi
@likethecoins
@vk_intel

Top Mentioned in G5:
@prashanth_ns
@vmware
@bamitav
@theregister
@uscert_gov
@intel
@cobadisec
@towardscybersec
@amazon
@google

Top Mentioned in G6:
@vmware
@zdnet
@workspaceone
@vmwarecloudaws
@vmw_carbonblack
@vmwtelcocloud
@vmwarecloud
@euctechzone
@takellermann
@vexpert

Top Mentioned in G7:
@vmware
@ctoadvisor
@ibm
@thectoadvisor
@azure
@antonioneri_hpe
@bryanl
@google
@danbuk4
@quinnypig

Top Mentioned in G8:
@campuscodi
@dinosn
@certeu
@1zrr4h
@nakashimae
@theregister
@david_das_neves
@zdnet
@virtual_dvp
@vmwaresrc

Top Mentioned in G9:
@ebiebi_pg
@esxi_arm
@sky_jokerxx
@lab8010
@motonori_shindo
@jangari_ntk
@onvmware
@masanara
@qryuu
@yuki_kawamitsu

Top Mentioned in G10:
@vmware
@vmugnl
@thefluffysysop
@itq
@jeffreykusters
@vswitchzero
@kierra_summer
@scorpvayne
@adanielhill
@gabsmashh

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@cybersec_feeds
@chidambara09
@yoshiki7111
@edinburghwatch
@zyitegadgets
@gambiste1
@world_news_eng
@as_sakimori
@tickeron

Top Tweeters in G1:
@yoshiki7111
@zyitegadgets
@tickeron
@crweworld
@feedjunkie
@schestowitz
@firmenpresse
@trialanderror_v
@csa_dvillamizar
@exbulletinuk

Top Tweeters in G2:
@tamosan
@sydsalesman
@souzaeluam
@education_24x7
@forbes
@pequeninwarrior
@newsweek
@aoki_d
@bitech
@cxi

Top Tweeters in G3:
@gambiste1
@stevejacksonva
@okrogules
@opensource_orgs
@eldokshe
@techjunkiejh
@pythonexpertbot
@lebalzin
@mayada_march
@evil_ryu_80

Top Tweeters in G4:
@youranonriots
@mznikkinew
@jonesls
@_sxnya
@jingbay
@kxnhfhtewsko
@andre3verzaal
@lightrider
@omyword
@rejectionking

Top Tweeters in G5:
@sectest9
@cybersec_feeds
@xaelbot
@codedailybot
@javascriptd
@thedeveloperbot
@cybersecurityn8
@ipythonistabot
@morolswediu
@jfsebastian146

Top Tweeters in G6:
@eggry
@john1966olsen
@rosenchild
@coder_487
@breizh2008
@cnbc
@celestebyrne3
@mig30m6
@wolfnw
@windows

Top Tweeters in G7:
@chidambara09
@tarundsnaol
@rwang0
@data_nerd
@holgermu
@drjdrooghaag
@danbuk4
@google
@billmew
@jason_kint

Top Tweeters in G8:
@_redfrog
@raivoonet
@snowdarkz
@tggleeson
@jenrobertson2o2
@c4rim
@charlyaztec
@tcely
@hackerfantastic
@campuscodi

Top Tweeters in G9:
@as_sakimori
@func_hs
@high_lemon2012
@you_and_i
@coprolite
@tomotch
@yutakama
@cobodo
@close_the_world
@xerespm

Top Tweeters in G10:
@angelwolf71885
@jikissgamer
@flackboxtv
@veb_xenon
@adanielhill
@albpro
@jimharris
@rmdes_
@aaronxgibson
@phillipwylie


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.