identify clusters, map connections, locate structural holes. 2. **Name your target clusters** — be specific about which information environments you need access to. 3. **Find natural bridge-builders** — people who already span the clusters you want to enter. 4. **Cultivate peers across clusters** —