Twitter clamps down on developers with restrictive API rules
The next version of Twitter's API aims to limit traditional Twitter clients and syndication
IDG News Service - Changes to Twitter's upcoming API release are aimed at restricting consumer-focused client applications in favor of business-oriented ones, according to the company's blog on Thursday.
Version 1.1 of Twitter's API (application programming interface) is scheduled for release in "the coming weeks," wrote Michael Sippey, a Twitter group product manager. Developers will have six months to migrate their applications to the new API, he wrote.
The technical changes are intended to grow applications centered around social CRM (customer relationship management), media integration, social analytics and social influence ranking.
"Nearly eighteen months ago, we gave developers guidance that they should not build client apps that mimic or reproduce the mainstream Twitter consumer client experience," Sippey wrote, citing applications such as Tweetbot, Echofon, Storify and Favstar.fm.
Among the significant changes are limits on how many user tokens Twitter grants to applications, which allow those applications to pull data. Twitter will allow applications to double their token count. After that, developers will not be able to add additional users without Twitter's permission.
Developers building new applications that want access to information such as home timelines and account settings and expect to need more than 100,000 tokens will have to ask for Twitter's approval as well. For even large user bases, such as more than one million tokens, Sippey wrote "we will require you to work with us directly."
"One of the key things we've learned over the past few years is that when developers begin to demand an increasingly high volume of API calls, we can guide them toward areas of value for users and their businesses," Sippey wrote.
Twitter, which has said it wants to create more consistent user experiences, will also impose new "Display Requirements." Those will include scaling Tweets appropriately based on the device on which the application is used, displaying Tweet actions such as reply, retweet and favorite and linking @usernames to the appropriate profile.
The announcement has already caused some anxiety for those who have integrated Twitter into their applications.
"Twitter has left themselves a lot of wiggle-room with the rules," wrote Marco Arment of Instapaper, an application that saves web pages for reading at another time, on his blog. "Effectively, Twitter can decide your app is breaking a (potentially vague) rule at any time, or they can add a new rule that your app inadvertently breaks and revoke your API access at any time."
"Of course, they've always had this power," Arment wrote. "But now we know that they'll use it in ways that we really don't agree with."
Sippey wrote that Twitter wants to encourage business applications, citing Crimson Hexagon, which builds Twitter reports for branding purposes; Topsy, an analytics platform for analyzing news; and DataMinr, which provides Twitter analytics for the finance industry.
"We've seen tremendous innovation in applications and services that serve the business market with analytics products based on Twitter content," Sippey wrote.
Send news tips and comments to firstname.lastname@example.org
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Social Media White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!