recommended reading

What do people do with their Twitter archives? So far not much


Twitter is working on a way to give tweeters access to their entire archive, leading us to wonder why anyone would want that in the first place. The company hasn't given much detail on what this future tool will look like. But it will involve what sounds like a slightly arduous exporting process. "We’re working on a tool to let users export all of their tweets," CEO Dick Costolo told The New York Times's Jenna Wortham. "You’ll be able to download a file of them." Right now, Twitter has an API that lets you download any user's tweets. But the company limits access to the most recent 3,200 tweets while all the old ones stay on their servers. That's enough to capture, say, my personal account, but not The Atlantic Wire's. There are already some outside tools that will store your Twitter activity in a database, like BackUpMyTweets or ThinkUp, but the process can be cumbersome and you have to start downloading before you hit that 3,200 tweet limit if you want a complete record of your account. And why would you want that? Some argue the point on principle. That's what Buzzfeed's Matt Buchanan means when he calls this idea "reclaiming our tweets." You crafted all of those nuggets of info and wit, you ought to be able to keep them somewhere. It's a persuasive argument, on simple fairness terms. But is there any utility beyond that? Not really.
Since the notion of downloading your tweets is not new (though downloading all 3,200+ will be), there have already been people who have tried making projects out of their own Twitter archives. We took a look around and saw what people have come up with. 
Some people want a "virtual diary." Unlike Facebook, which has forced us to recreate our past, the current Twitter model erases our childhoods. PCWorld imagines what it would be like to take a stroll down our Twitter memory lane. Computerworld made it sound less narcissistic and more cathartic. "So the idea of a person being able to see perhaps tens of thousands of his thoughts over time, all in one place, is pretty compelling. For some people it would work out to be like a virtual diary and news chronicle all in one," writes Christina DesMarais.

Read the full story at The Atlantic Wire.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.