Feeds

TwitPic founder tries to pull rug from under Twitter

Revenge rug-tug bid against colossus probably doomed

3 Big data security analytics techniques

The creator of Twitpic, the photo-sharing system sitting atop Twitter, has launched his own Twitter clone.

Heello [sic] launched last week and looks surprisingly like Twitter, in layout and function. It refers to "tweets" as "pings", and "followers" as "listeners", but otherwise has little to distinguish, or recommend, itself, so much so that some are suggesting its just a complicated protest against the overriding power of the establishment.

But founder Noah Everett is having none of that, and argues that Heello will have services and features that make it a viable competitor to Twitter. The first of those resembles Google+ Circles: closed distribution lists that enable one to share posts with a subset of followers, but others are promised.

Everett set up Heello, as a company, last year, but launched the service last week – a day after Twitter started hosting pictures itself.

Until now, anyone wanting to share a picture over Twitter had to post a URL to a hosting service, with Twitpic being one of the more popular services and bringing in a decent living to Everett by displaying advertisements around the images. But last week Twitter itself started hosting photographs, pulling the business model out from under Twitpic and other companies that were providing similar services.

Heello, unsurprisingly, also has a picture-sharing service built in, but other than that the differences are hard to spot: Heello puts the profile on the left (while Twitter puts it on the right), and Heello has a picture of a cloud in the background, but take a look at Heello's Twitter feed and it's hard to tell where you are.

In social networking the barriers to entry are almost insurmountable, as Google has repeatedly demonstrated, but incumbents do tend to become moribund when competition is lacking. In China, where the government's ban on Twitter has created a competitive field, the different services innovate continuously to compete: image uploading and closed lists are old news on the other side of the Chinese Firewall.

Google's Circles and ability to mute specific subjects are both welcome innovations in social networks, and will no doubt come to Facebook very soon, just as Heello's lists will be implemented on Twitter in time. Competitors might not succeed, but they can push the incumbent to do something more interesting, and that's to be welcomed, even if the business appears (from the outside) to be ill-founded. ®

3 Big data security analytics techniques

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.