Hi Wallace,
http://www.Twollo.com does something similar to what you are describing (it
hosted on the Google App Engine). You can store the users oAuth token
secret, access token (and request token if you don't have the access token)
and then use these at a later date to send authenticated
!-- this is the javascript json parser function --
script type=text/javascript src=../jquery-1.2.6.min.js
/script
script type=text/javascript
$(document).ready(function(){
$('form#search').bind(submit, function(e){
e.preventDefault();
What's the official way of setting up an API proxy for a mobile
twitter client ( like birdnest ) ?
Getting it whitelisted through http://twitter.com/help/request_whitelisting?
Is the 20.000 API calls/h also including calls to the Twitter Search
API?
Cheers
@janole
Paul,
Ah, so you are saying that a token never expires? I did not realize
that. I had assumed that the token was specific to a given session or
timeframe. I'm going to experiment with this and get back on this.
Wally
Paul posted in response to me
Hi Wallace,
http://www.Twollo.com does
What do you mean by replication lag? Is this related to repeated
tweets in the search results?
Hi,
I believe the access_token last indefinitely (or at least a very very long
time). The request token is very short lived though.
Paul
2009/6/6 Wallace wallace.b.mccl...@gmail.com
Paul,
Ah, so you are saying that a token never expires? I did not realize
that. I had assumed that the
I'd like to also voice my agreement with Chad here, if you're
specifically wanting to follow someone/thing you should get it. I
agree with filtering in search, but in this case you are purposefully
stating you wish to follow someones updates, and the result should
reflect that, regardless of how
See [1] for information on replication. Sometimes there is a lag in the
replication of the database across multiple machines.
1. http://en.wikipedia.org/wiki/Replication_(computer_science)
Thanks,
Doug
On Sat, Jun 6, 2009 at 8:24 AM, davidz...@yahoo.com wrote:
What do you mean by replication
Hello, wondering if the following scenario is possible with oAuth.
- I have mytwittersite.com
- A user authenticates with twitter through oauth on my site.
- user posts a pic to twitpic from my site using oauth tokens.
With basic auth, very easy to do but it doesn't seem like I can do a
I'm doing some graph analysis on Twitter, Digg, Friendfeed, etc.
It would be nice if Twitter could include the handle of the user (and
possibly the name) when obtaining outbound edges.
I understand this might be a performance issue but I wanted to bring
it up regardless.
All the other systems
what are you referring to here?
On Sat, Jun 6, 2009 at 15:44, burton burtona...@gmail.com wrote:
obtaining outbound edges
--
Abraham Williams | Community | http://web608.org
Hacker | http://abrah.am | http://twitter.com/abraham
Project | http://fireeagle.labs.poseurtech.com
This email is:
Unfortunately I'm not in the position to file a ticket with support for
every spam user on Twitter. You may want to consider a more thorough
algorithm for your spam filtering. For instance, I'm pretty sure public
radio assets are not taking part in spam activities.
We'll just need to code around
I would love to join too!
Cyril
@mocy @twazzup
is there a list of all possible error messages that twitter sends
currently I can see?
I found http://apiwiki.twitter.com/HTTP-Response-Codes-and-Errors
but this only lists the http response codes, not the actual error
message twitter puts in the body of the message.
would be good to know the
14 matches
Mail list logo