|Displaying Topics 56 - 95 (65 total) Sorted by: Date-Last-Post, Direction: reverse|
|56:|| Twitter's Official Analytics Product Has Arrived|
Twitter Analytics will crunch a lot of data about a user account, including which tweets are most successful, which tweets caused people to unfollow, and who the most influential followers are.
|Nov 18, 2010|
|57:|| Twitter Poised to Let Businesses Claim Their Place|
This puts Twitter in direct competition with FaceBook and Foursquare
|Nov 9, 2010|
|58:|| Twitter Starts Trialling Ads In Users' Streams|
"...this new kind of paid ad would appear in a user's Twitter stream regardless of whether they follow that advertiser or search for anything on Twitter."
|Nov 2, 2010|
|59:|| Widget Gives Sidebar Details Pane On Twitter|
"The new details pane instantly displays content like photos and videos,..."
|Oct 21, 2010|
|60:|| Twitter Transitions To a New Search Back End|
"Our demands on the new system are immense: With over 1,000 TPS (Tweets/sec) and 12,000 QPS (queries/sec) = over 1 billion queries per day (!) we already put a very high load on our machines."
|Oct 7, 2010|
|61:|| Twitter CEO Dick Costolo: 'No, I am not prepping Twitter for a sale.'|
"We've both done that selling a start-up thing to big companies like Google, and don't want to do it with Twitter..."
|Oct 6, 2010|
|62:|| Twitter Names Dick Costolo CEO|
"During his year at Twitter, he has been a critical leader in devising and executing our revenue efforts, while simultaneously and effectively making the trains run on time in the office."
|Oct 5, 2010|
|63:|| Looks like Twitter was hacked |
|Sept 21, 2010|
|64:|| Twitter Launches Redesigned Site|
"Today, we're introducing a new, re-engineered Twitter.com that provides an easier, faster, and richer experience."
|Sept 15, 2010|
|65:|| Twitter's Change to OAuth Authentication Generates Security Debate|
Twitter recently stopped supporting its Basic authentication for third party applications (there are over 70,000 of them at this point) and now supports only the OAuth authentication method. This has kicked up a storm of controversy.
|Sept 5, 2010|