Feeds

Twitter is mainly pointless babble and other rubbish

Analysts pinpoint self promotion, then self-promote

Internet Security Threat Report 2014

Most of Twitter is pointless babble, spam and self promotion, a bunch of Texas-based marketing analysts with improbable nicknames has declared.

The study by Pear Analytics categorised a sample of US Twitter traffic into seven categories: news, spam, self-promotion, pointless babble (what it called the “I am eating a sandwich now” tweets), conversational and pass along.

The Texas-based research firm declared that pointless babble accounted for 40.55 per cent of traffic, while spam accounted for 3.75 per cent and self promotion 5.85 per cent. We'd take a guess that "conversational" will largely consist of people asking the pointless babblers what exactly was in their sandwich. Either way, it accounted for 37.55 per cent of Tweets.

This leaves us with total news accounting for 3.6 per cent of Twitter traffic and tweets with pass along value - or retweets - accounting for 8.7 per cent.

The researchers also found that conversational peaked between 2.00pm and 2.30pm, and again at 4pm to 4.30pm, with pointless babble peaking between 2.30pm and 3pm.

Apparently, the best days for news and conversation are Tuesdays. By Thursdays, though, Tweeters have descended into babble and spam.

Strangely the researchers did not consider what happened over the weekends, presumably because they think the Twitterati would be out rock climbing or mountain biking. This seems bizarre when so much of Twitter concerns sandwiches.

In the meantime, they suggest that anyone trying to get rid of the babble could consider a filter, such as Philtro.

Philtro's CEO is one Paul Singh, who has a BS from George Mason University, and who apparently "likes it when people call him "Mr. Metrics.""

Funnily enough, Pear Analytics' Business Intelligence Expert is "Paul Singh (aka “Mr. Metrics”)" who also has a BS from George Mason University.

Which if nothing else, suggests that Philtro should be able to spot self-promotion.

Should you want to find out more, Pear's website is here. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.