Twitter cracks down on third party clients

 

Don't mimic us, don't violate our terms.

Twitter’s Platform head, Ryan Sarver, has warned third-party developers to avoid building apps that merely mimic the microblogging site's existing user interface.

"Twitter will provide the primary mainstream consumer client experience on phones, computers, and other devices," explained Sarver on a mailing list.

“Developers ask us if they should build client apps that mimic or reproduce the mainstream Twitter consumer client experience. The answer is no,” he said.

Developers had a mixed reaction to the new guidelines, which came as Twitter pushes out its own iPhone, BlackBerry, iPad and Android apps, and tightens control over who has access to its application protocol interface (API).

Sarver said this was to standardise the Twitter experience, which had become fractured by some third party developers.

“We need to ensure that tweets, and tweet actions, are rendered in a consistent way so that people have the same experience with tweets no matter where they are.”

“If there are too many ways to use Twitter that are inconsistent with one another, we risk diffusing the user experience.”

He warned Twitter would continue to crack down on apps that violate its terms of service. The company showed it meant business last month, suspending UberMedia’s widely used UberTwitter for BlackBerry and twidroyd for Androids, allegedly for breaching its terms. 

"Twitter will always be a platform on which a smart developer with a great idea and some cool technology can build a great company of his or her own," said Sarver.

Third party apps that Sarver pointed to that fit that profile included FourSquare, Instagram, SocialFlow, Mass Relevance, Seesmic and HootSuite.

Copyright © iTnews.com.au . All rights reserved.


Twitter cracks down on third party clients
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1089

Vote