Hello All,
I would like to ask a little time from all of you to join a survey here:
http://www.surveymonkey.com/s/Z9RPFDD
The idea is to collect answer of this question: Can you code and
tweet/update status at the same time?
Thanks in advance,
--
Good software can't be measured by `wc -l soft
2010/9/23 玉柱九天 :
> what is the url and parameters of tweet in c++(liboauth)?
>
> i want to code the fuction of tweet in c++ and base on the api "liboauth".
> but don't know tahat is the POST url and parameters?
>
This probably helps
http://github.com/gregkh/bti
The latest release of bti supports
On Sat, Sep 4, 2010 at 4:43 AM, Herb wrote:
> You find not one Twitter application for Linux that is working.
> Means Twitter is just useless if you use Linux.
> Not to talk from the thousands of Websites which send status messages
> to Twitter (e.g. a new posting/thread is entered).
>
I use bti,
"bar";
rv1 = send_tweet(tweet1);
rv2 = send_tweet(tweet1);
rv3 = send_tweet(tweet2);
above sequence, only rv1 and rv3 are succeed.
DWI
On Oct 28, 8:14 am, Dwi Sasongko Supriyadi wrote:
> > Hello,
> >
> > On Wed, Oct 28, 2009 at 6:23 PM, Greg wrote:
> >
> >
Hello,
On Wed, Oct 28, 2009 at 6:23 PM, Greg wrote:
>
> Hello,
>
> I have an application that sends out a Tweet when a user Authorizes
> the Application and asks a Question to a particular user. Does Twitter
> block continous sending out of a Tweet within a time period? I am
> doing testing of
Hi Scott,
On Tue, Oct 27, 2009 at 5:12 PM, Scott Haneda wrote:
>
> The Twitter Dev/API list is the one list that there is a very often posted
> thread of this nature. I call it the Twitter Think Tank BandWagon™ :)
>
> Twitter hits the news, the news reports that application x, y, and z are
> al
in anymore, Mallory has changed his password.
> On Thu, Oct 15, 2009 at 9:19 AM, Dwi Sasongko Supriyadi > wrote:
>
>>
>>
>> On Thu, Oct 15, 2009 at 2:06 AM, Chris Babcock > > wrote:
>>
>>>
>>> The situation in this scenario is that Mallory
On Thu, Oct 15, 2009 at 2:06 AM, Chris Babcock wrote:
>
> The situation in this scenario is that Mallory phished Bob's Twitter
> credentials and used them to authorize access for himself with an OAuth
> App that Bob also uses. Mallory can only be detected by the changes he
> makes in the account;