Hmm. Thank you. So it's apparently something within the twitter algorithm that is doing the analysis. Is it possible to do it from outside? It would seem to me the programmer who could devise that scheme would not only make a fortune, but do the world a favor by applying it to all social media (and other platforms.)
I am not a programmer anymore (many years ago I worked in COBOL). I am guessing that Twitter could just limit permissions from certain IP addresses, or maybe their program stopped certain commands from running. Beyond this guess I can only shake my head.
Hmm. Thank you. So it's apparently something within the twitter algorithm that is doing the analysis. Is it possible to do it from outside? It would seem to me the programmer who could devise that scheme would not only make a fortune, but do the world a favor by applying it to all social media (and other platforms.)
I am not a programmer anymore (many years ago I worked in COBOL). I am guessing that Twitter could just limit permissions from certain IP addresses, or maybe their program stopped certain commands from running. Beyond this guess I can only shake my head.
I see. Thanks.