Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Tweets, Viruses and Bubbles
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Tweets, Viruses and Bubbles
Data MiningPredictive Analytics

Tweets, Viruses and Bubbles

Editor SDC
Editor SDC
4 Min Read
SHARE

image

Twitter seems to have some design flaws which may be the result of its developers not thinking enough about security in its early innocent days of development. 

One obvious potential security concern is the automatic url shortening apps that Twitter users use to send links to each other.  You don’t realy know where you are being re-directed until you are there.

Identity theft is another concern.  Twitter users almost revel in sheer joy of opening up about themselves with unprotected tweets.

More Read

CBS’s Television City Redefines In-House/DIY Market Research
Conceptualizing Learning Error
Quick Strata update
Kosmix, along with DeepPeep, are example of the Deep Web , aka…
Build your own slide rule with R

One possible solution is to have two twitter streams; one protected and personal and another for personal branding and promoting yourself professionally.

This risk is enhanced with by sheer explosion of auto bots that feed off rss, automatically follow, automatically send messages that say hello thanks for joining me. How do you know who the other person is?

Inability to segment your followers into people you want to share this stuff with and people you don’t want to share a particular tweet with thus a data concern     (unlike Facebook which does have multiple privacy levels for potential contacts).

Is there really a recession going on?

The sheer explosion of  Twitter app developers see www.twitter…

image

Twitter seems to have some design flaws which may be the result of its developers not thinking enough about security in its early innocent days of development. 

One obvious potential security concern is the automatic url shortening apps that Twitter users use to send links to each other.  You don’t realy know where you are being re-directed until you are there.

Identity theft is another concern.  Twitter users almost revel in sheer joy of opening up about themselves with unprotected tweets.

One possible solution is to have two twitter streams; one protected and personal and another for personal branding and promoting yourself professionally.

This risk is enhanced with by sheer explosion of auto bots that feed off rss, automatically follow, automatically send messages that say hello thanks for joining me. How do you know who the other person is?

Inability to segment your followers into people you want to share this stuff with and people you don’t want to share a particular tweet with thus a data concern     (unlike Facebook which does have multiple privacy levels for potential contacts).

Is there really a recession going on?

The sheer explosion of  Twitter app developers see www.twitter.com/downloads (just like the now not so chic Facebook application bubble) means that the techie world at least refuses to recognize the recession.

Innovation, creative destruction and the invisible hand of economics are still working, even if  CEOs and politicians have frozen in place..

Application developing bubbles are better than real estate bubbles as long as venture capitalists and high tech remember 2001 (Nasdaq)

On the $1 billion that Twitter reportedly turned down  

The inability of Twitter to upload, share pictures, share videos without diverting and losing traffic means they better start think slivers of stock for funding even if they don’t want to sell the whole company yet.

  • Share/Save/Bookmark

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

AI role in medical industry
The Role Of AI In Transforming Medical Manufacturing
Artificial Intelligence Exclusive
b2b sales
Unseen Barriers: Identifying Bottlenecks In B2B Sales
Business Rules Exclusive Infographic
data intelligence in healthcare
How Data Is Powering Real-Time Intelligence in Health Systems
Big Data Exclusive
intersection of data
The Intersection of Data and Empathy in Modern Support Careers
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Electrospinning is a process that uses an electrical charge to…

2 Min Read

Top 5 Reasons R is Good for you

4 Min Read

The 4 Biggest Problems with Big Data

4 Min Read

A Visual Delight – Inauguration Day Helicopter Lesson

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?