Feeds

TwitPic founder tries to pull rug from under Twitter

Revenge rug-tug bid against colossus probably doomed

SANS - Survey on application security programs

The creator of Twitpic, the photo-sharing system sitting atop Twitter, has launched his own Twitter clone.

Heello [sic] launched last week and looks surprisingly like Twitter, in layout and function. It refers to "tweets" as "pings", and "followers" as "listeners", but otherwise has little to distinguish, or recommend, itself, so much so that some are suggesting its just a complicated protest against the overriding power of the establishment.

But founder Noah Everett is having none of that, and argues that Heello will have services and features that make it a viable competitor to Twitter. The first of those resembles Google+ Circles: closed distribution lists that enable one to share posts with a subset of followers, but others are promised.

Everett set up Heello, as a company, last year, but launched the service last week – a day after Twitter started hosting pictures itself.

Until now, anyone wanting to share a picture over Twitter had to post a URL to a hosting service, with Twitpic being one of the more popular services and bringing in a decent living to Everett by displaying advertisements around the images. But last week Twitter itself started hosting photographs, pulling the business model out from under Twitpic and other companies that were providing similar services.

Heello, unsurprisingly, also has a picture-sharing service built in, but other than that the differences are hard to spot: Heello puts the profile on the left (while Twitter puts it on the right), and Heello has a picture of a cloud in the background, but take a look at Heello's Twitter feed and it's hard to tell where you are.

In social networking the barriers to entry are almost insurmountable, as Google has repeatedly demonstrated, but incumbents do tend to become moribund when competition is lacking. In China, where the government's ban on Twitter has created a competitive field, the different services innovate continuously to compete: image uploading and closed lists are old news on the other side of the Chinese Firewall.

Google's Circles and ability to mute specific subjects are both welcome innovations in social networks, and will no doubt come to Facebook very soon, just as Heello's lists will be implemented on Twitter in time. Competitors might not succeed, but they can push the incumbent to do something more interesting, and that's to be welcomed, even if the business appears (from the outside) to be ill-founded. ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.