Twitter is an online social networking service that enables users to send and read short 140-character messages called "tweets".Registered users can read and post tweets, but unregistered users can only read them. Users access Twitter through the website interface, SMS, or mobile device app. Twitter Inc. is based in San Francisco and has more than 25 offices around the world.Twitter was created in March 2006 by Jack Dorsey, Evan Williams, Biz Stone and Noah Glass and by July 2006 the site was launched. The service rapidly gained worldwide popularity, with more than 100 million users who in 2012 posted 340 million tweets per day. The service also handled 1.6 billion search queries per day. In 2013 Twitter was one of the ten most-visited websites, and has been described as "the SMS of the Internet." As of December 2014, Twitter has more than 500 million users, out of which more than 284 million are active users. Wikipedia.
Twitter | Date: 2015-07-27
An example system and method elicits reviews and opinions from users via an online system or a web crawl. Opinions on topics are processed in real time to determine orientation. Each topic is analyzed sentence by sentence to find a central tendency of user orientation toward a given topic. Automatic topic orientation is used to provide a common comparable rating value between reviewers and potentially other systems on similar topics. Facets of the topics are extracted via a submission/acquisition process to determine the key variables of interest for users.
Twitter | Date: 2015-06-12
An unmanned aerial vehicle (UAV) carries a camera, sends data from the camera, and receives commands. The UAV is connected to a messaging platform. Pictures or video clips received from the UAV are selected and placed in messages broadcast by an account associated with the UAV. Video footage from the camera is live-streamed in a card-type message. Account holders of the messaging platform may control the UAV with commands embedded in messages and directed towards an account associated with the UAV. Controllable elements of the UAV include UAV location, camera orientation, camera subject, UAV-mounted lighting, a UAV-mounted display, a UAV-mounted projector, UAV-mounted speakers, and a detachable payload. UAV control may be determined through democratic means. Some UAV functionality may be triggered through aggregated engagements on the messaging platform. The UAV may include a display screen and/or a microphone to provide for telepresence or interview functionality.
Twitter | Date: 2015-04-28
A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared with the application.
Twitter | Date: 2015-04-29
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.
Twitter | Date: 2014-03-14
A method and system generates a model of a geographic area for use in identifying locations of the geographic area. A set of variably sized tiles is defined for each of a set of overlapping geometries in the geographic area. Each of the variably sized tiles is defined by a geohash, where the size of the tile is dependent on a granularity of the geohash. A geocode trie structure representing the variably sized tiles can be constructed and used to map one or more provided location coordinates to at least one of the geometries represented by the tiles.