Feeds

Twitter is mainly pointless babble and other rubbish

Analysts pinpoint self promotion, then self-promote

Security for virtualized datacentres

Most of Twitter is pointless babble, spam and self promotion, a bunch of Texas-based marketing analysts with improbable nicknames has declared.

The study by Pear Analytics categorised a sample of US Twitter traffic into seven categories: news, spam, self-promotion, pointless babble (what it called the “I am eating a sandwich now” tweets), conversational and pass along.

The Texas-based research firm declared that pointless babble accounted for 40.55 per cent of traffic, while spam accounted for 3.75 per cent and self promotion 5.85 per cent. We'd take a guess that "conversational" will largely consist of people asking the pointless babblers what exactly was in their sandwich. Either way, it accounted for 37.55 per cent of Tweets.

This leaves us with total news accounting for 3.6 per cent of Twitter traffic and tweets with pass along value - or retweets - accounting for 8.7 per cent.

The researchers also found that conversational peaked between 2.00pm and 2.30pm, and again at 4pm to 4.30pm, with pointless babble peaking between 2.30pm and 3pm.

Apparently, the best days for news and conversation are Tuesdays. By Thursdays, though, Tweeters have descended into babble and spam.

Strangely the researchers did not consider what happened over the weekends, presumably because they think the Twitterati would be out rock climbing or mountain biking. This seems bizarre when so much of Twitter concerns sandwiches.

In the meantime, they suggest that anyone trying to get rid of the babble could consider a filter, such as Philtro.

Philtro's CEO is one Paul Singh, who has a BS from George Mason University, and who apparently "likes it when people call him "Mr. Metrics.""

Funnily enough, Pear Analytics' Business Intelligence Expert is "Paul Singh (aka “Mr. Metrics”)" who also has a BS from George Mason University.

Which if nothing else, suggests that Philtro should be able to spot self-promotion.

Should you want to find out more, Pear's website is here. ®

Internet Security Threat Report 2014

More from The Register

next story
ONE MILLION people already running Windows 10
A third of them are doing it in VMs, but early feedback focuses on frippery
Sign off my IT project or I’ll PHONE your MUM
Honestly, it’s a piece of piss
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Torvalds CONFESSES: 'I'm pretty good at alienating devs'
Admits to 'a metric ****load' of mistakes during work with Linux collaborators
Sway: Microsoft's new Office app doesn't have an Undo function
Content aggregation, meet the workplace ... oh
Do Moan! MONSTER 6-day EMAIL OUTAGE hits Domain Monster
Customers freaked out by frightful service
Ploppr: The #VultureTRENDING App of the Now
This organic crowd sourced viro- social fertiliser just got REAL
Return of the Jedi – Apache reclaims web server crown
.london, .hamburg and .公司 - that's .com in Chinese - storm the web server charts
NetWare sales revive in China thanks to that man Snowden
If it ain't Microsoft, it's in fashion behind the Great Firewall
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.