An evil twitter bot that searches for people posting things like “Only 5 more followers until we have 500, please RT!”. It then follows them and waits a couple of days before replying with “Quality is more important than quantity. *unfollow*” – and unfollowing.
I won’t do this, but thought I’d mention it …
Tech Meetup uses Twitter Feed to tweet any new threads started on it’s Google Groups email list. How can we exploit this for fun and profit? Continue reading Exploiting Tech Meetups automatic Tweets from it’s Email List
For Culture Hack Scotland this year I worked on an idea I came up with that week. I feel I didn’t really do the hack day properly; I ended up working on my own and not using any of the data. But the event was the perfect opportunity to test the idea.
Flocklight pulls all the twitter data for those attending or mentioning an event like a conference, and tries to highlight useful data about the connections between people. The aim is to provide you with information so you make the most of an event. For instance, are others you know going? Do you have something in common with a stranger there who you can go and chat to?
Continue reading Flocklight: highlighting connections in a crowd
Facebook apps, which can ask for any set of permissions from a user at any time, can start by requesting some basic permissions and can request others later when the users trust has been won. In contrast, Twitter apps are very inflexible. You must set what permissions you want and ask for them at the start, with no chance to change them.
If your Twitter app could work equally well with both read-only or write permissions, what do you do? If you ask for read permissions part of your app won’t work, and if you ask for write permissions then some users may be scared to give them to you and just abandon your app.
Continue reading Dealing with Twitter apps inflexible permissions