Twitter as a means for exchanging possibly sensitive business data? Maybe not such a great idea. Remember that your Twitter timeline can be accessed by anyone who want to subscribe (unless you specifically block them or hide access to your tweets — and I’m not sure how secure that really is from a determined hacker) and is probably eminently discoverable in patent and other legal proceedings. Secure it is not.
But this is still a very creative way to tie together technologies. Since it’s often difficult to predict when a simulation will converge, simply being pinged to know that it is done has tremendous value. Using Twitter to do this is an imaginative combination of an emerging technology and old-school engineering.
Discover more from Schnitger Corporation
Subscribe to get the latest posts sent to your email.

